๐Ÿ” CVE Alert

CVE-2026-4953

HIGH 7.3

mingSoft MCMS Editor Endpoint BaseAction.java catchImage server-side request forgery

CVSS Score
7.3
EPSS Score
0.0%
EPSS Percentile
11th

A weakness has been identified in mingSoft MCMS up to 5.5.0. This issue affects the function catchImage of the file net/mingsoft/cms/action/BaseAction.java of the component Editor Endpoint. Executing a manipulation of the argument catchimage can lead to server-side request forgery. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks.

CWE CWE-918
Vendor mingsoft
Product mcms
Published Mar 27, 2026
Last Updated Mar 30, 2026
Stay Ahead of the Next One

Get instant alerts for mingsoft mcms

Be the first to know when new high vulnerabilities affecting mingsoft mcms are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

mingSoft / MCMS
5.0 5.1 5.2 5.3 5.4 5.5.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/?id.353831 vuldb.com: https://vuldb.com/?ctiid.353831 vuldb.com: https://vuldb.com/?submit.777516 github.com: https://github.com/wing3e/public_exp/issues/3

Credits

๐Ÿ” Winegee (VulDB User)