Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1061: Unrestricted Upload in xiweicheng TMS

0
Medium
VulnerabilityCVE-2026-1061cvecve-2026-1061
Published: Sat Jan 17 2026 (01/17/2026, 19:02:05 UTC)
Source: CVE Database V5
Vendor/Project: xiweicheng
Product: TMS

Description

CVE-2026-1061 is a medium severity vulnerability in xiweicheng TMS versions up to 2. 28. 0, involving an unrestricted file upload flaw in the Upload function of FileController. java. The vulnerability allows remote attackers to manipulate the filename parameter to upload arbitrary files without proper validation or restrictions. Exploitation requires no user interaction or authentication and can lead to partial compromise of confidentiality, integrity, and availability. Although no known exploits are currently observed in the wild, the exploit code is publicly available, increasing the risk of attacks. European organizations using xiweicheng TMS should prioritize patching or mitigating this vulnerability to prevent potential unauthorized file uploads that could lead to further system compromise. Countries with higher adoption of xiweicheng TMS or critical infrastructure relying on it are at greater risk. Mitigation includes implementing strict filename validation, restricting upload types, and monitoring upload activity closely.

AI-Powered Analysis

AILast updated: 01/17/2026, 19:26:04 UTC

Technical Analysis

CVE-2026-1061 is a vulnerability identified in the xiweicheng TMS product, affecting all versions up to 2.28.0. The flaw resides in the Upload function within the FileController.java source file, where the filename argument is insufficiently validated, allowing an attacker to perform unrestricted file uploads remotely. This lack of validation means an attacker can upload arbitrary files, potentially including malicious scripts or executables, which could be used to execute code, escalate privileges, or disrupt service. The vulnerability does not require authentication or user interaction, making it easier to exploit remotely over the network. The CVSS 4.0 score of 5.3 reflects a medium severity, indicating moderate impact on confidentiality, integrity, and availability with low attack complexity. The exploit is publicly available, increasing the likelihood of exploitation attempts. No known exploits in the wild have been reported yet. The vulnerability affects a wide range of versions from 2.0 through 2.28.0, indicating a long-standing issue in the product. The absence of official patches or mitigation links suggests that users must implement their own controls or await vendor updates. This vulnerability could be leveraged to upload web shells or malware, leading to further compromise of affected systems.

Potential Impact

For European organizations, the unrestricted upload vulnerability poses significant risks, especially for those relying on xiweicheng TMS for critical business or operational functions. Successful exploitation could lead to unauthorized code execution, data breaches, or service disruptions. Confidentiality may be compromised if sensitive files are accessed or exfiltrated through uploaded malicious payloads. Integrity is at risk if attackers modify or replace legitimate files, potentially undermining trust in the system. Availability could be affected if attackers deploy ransomware or cause system crashes via malicious uploads. The fact that no authentication is required lowers the barrier for attackers, increasing exposure. Organizations in sectors such as manufacturing, logistics, or supply chain management using xiweicheng TMS could face operational downtime or regulatory repercussions under GDPR if personal data is compromised. The public availability of exploit code further elevates the threat level, making timely mitigation critical to avoid targeted attacks.

Mitigation Recommendations

European organizations should immediately assess their use of xiweicheng TMS and identify affected versions. In the absence of official patches, implement strict input validation on the filename parameter to block dangerous characters and file types. Restrict upload directories to non-executable paths and enforce file type whitelisting to prevent uploading of scripts or executables. Employ web application firewalls (WAFs) with rules to detect and block suspicious upload attempts. Monitor logs for unusual upload activity and conduct regular audits of uploaded files. Isolate the TMS system within segmented network zones to limit lateral movement in case of compromise. Consider deploying endpoint detection and response (EDR) solutions to detect post-exploitation behaviors. Engage with the vendor for official patches or updates and apply them promptly once available. Train staff on recognizing signs of compromise related to file upload abuse. Finally, maintain regular backups of critical data to enable recovery if an attack occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-16T19:09:09.143Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696bdef1d302b072d91db3cc

Added to database: 1/17/2026, 7:11:45 PM

Last enriched: 1/17/2026, 7:26:04 PM

Last updated: 1/17/2026, 10:36:23 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats