Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1062: Server-Side Request Forgery in xiweicheng TMS

0
Medium
VulnerabilityCVE-2026-1062cvecve-2026-1062
Published: Sat Jan 17 2026 (01/17/2026, 19:32:05 UTC)
Source: CVE Database V5
Vendor/Project: xiweicheng
Product: TMS

Description

A flaw has been found in xiweicheng TMS up to 2.28.0. This affects the function Summary of the file src/main/java/com/lhjz/portal/util/HtmlUtil.java. This manipulation of the argument url causes server-side request forgery. It is possible to initiate the attack remotely. The exploit has been published and may be used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 22:47:50 UTC

Technical Analysis

CVE-2026-1062 is a server-side request forgery vulnerability affecting xiweicheng TMS software versions 2.0 through 2.28.0. The vulnerability resides in the Summary function of the HtmlUtil.java source file, where the url parameter is improperly validated or sanitized. This flaw allows an attacker to craft malicious requests that the server then executes, potentially accessing internal resources or services that are otherwise inaccessible externally. SSRF vulnerabilities typically enable attackers to bypass network access controls, scan internal networks, or interact with backend services, which can lead to further exploitation such as data exfiltration or lateral movement. The vulnerability can be triggered remotely without requiring user interaction or authentication, increasing the risk of exploitation. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L - low privileges required), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). While no active exploits have been reported in the wild, the availability of proof-of-concept code raises the likelihood of future attacks. The lack of official patches or mitigation links in the provided data suggests that users must proactively apply security best practices or await vendor updates.

Potential Impact

The SSRF vulnerability in xiweicheng TMS can have significant impacts on organizations using this software. Exploitation could allow attackers to access internal network resources that are normally protected by firewalls or network segmentation, potentially exposing sensitive data or internal services. This could lead to unauthorized information disclosure, internal network reconnaissance, or pivoting to other systems within the network. Since the vulnerability requires no user interaction and can be exploited remotely, it increases the attack surface and risk of automated attacks. Organizations relying on xiweicheng TMS for critical operations may face service disruptions or data breaches if attackers leverage this SSRF flaw. The medium CVSS score reflects moderate risk, but the actual impact depends on the internal network architecture and the sensitivity of accessible resources. Without timely mitigation, the vulnerability could be a stepping stone for more severe attacks such as privilege escalation or ransomware deployment.

Mitigation Recommendations

To mitigate CVE-2026-1062, organizations should first verify if they are running affected versions of xiweicheng TMS (2.0 through 2.28.0). Immediate actions include restricting network access to the TMS server to trusted IPs and internal networks only, thereby limiting exposure to potential attackers. Implement strict input validation and sanitization on the url parameter in the Summary function to prevent malicious request manipulation. Employ network segmentation and firewall rules to restrict the TMS server's ability to make arbitrary outbound requests, especially to sensitive internal services. Monitor logs for unusual outbound requests originating from the TMS server that could indicate exploitation attempts. If vendor patches become available, prioritize their deployment. Additionally, consider deploying web application firewalls (WAFs) with custom rules to detect and block SSRF attack patterns targeting the TMS application. Conduct regular security assessments and penetration tests focused on SSRF vectors to ensure the effectiveness of mitigations.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-16T19:09:14.916Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696be5f9d302b072d920ccc4

Added to database: 1/17/2026, 7:41:45 PM

Last enriched: 2/23/2026, 10:47:50 PM

Last updated: 3/24/2026, 1:44:59 AM

Views: 108

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses