๐Ÿ” CVE Alert

CVE-2026-2665

MEDIUM 6.3

huanzi-qch base-admin JSP Parser SysFileController.java upload unrestricted upload

CVSS Score
6.3
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability was detected in huanzi-qch base-admin up to 57a8126bb3353a004f3c7722089e3b926ea83596. Impacted is the function Upload of the file SysFileController.java of the component JSP Parser. Performing a manipulation of the argument File results in unrestricted upload. The attack can be initiated remotely. The exploit is now public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The project was informed of the problem early through an issue report but has not responded yet.

CWE CWE-434 CWE-284
Vendor huanzi-qch
Product base-admin
Published Feb 18, 2026
Last Updated Feb 23, 2026
Stay Ahead of the Next One

Get instant alerts for huanzi-qch base-admin

Be the first to know when new medium vulnerabilities affecting huanzi-qch base-admin are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

huanzi-qch / base-admin
57a8126bb3353a004f3c7722089e3b926ea83596

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/?id.346462 vuldb.com: https://vuldb.com/?ctiid.346462 vuldb.com: https://vuldb.com/?submit.753240 github.com: https://github.com/huanzi-qch/base-admin/issues/38 github.com: https://github.com/huanzi-qch/base-admin/issues/38#issue-3905100373 github.com: https://github.com/huanzi-qch/base-admin/

Credits

๐Ÿ” Jszdk (VulDB User)