Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1111: Path Traversal in Sanluan PublicCMS

0
Medium
VulnerabilityCVE-2026-1111cvecve-2026-1111
Published: Sun Jan 18 2026 (01/18/2026, 05:32:05 UTC)
Source: CVE Database V5
Vendor/Project: Sanluan
Product: PublicCMS

Description

A vulnerability has been found in Sanluan PublicCMS up to 5.202506.d. This impacts the function Save of the file com/publiccms/controller/admin/sys/TaskTemplateAdminController.java of the component Task Template Management Handler. Such manipulation of the argument path leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 01/25/2026, 19:37:22 UTC

Technical Analysis

CVE-2026-1111 is a path traversal vulnerability identified in Sanluan PublicCMS versions up to 5.202506.d, affecting the Save function within the TaskTemplateAdminController.java file, which handles Task Template Management. The vulnerability arises from improper sanitization of the 'path' argument, allowing an attacker to manipulate file paths and traverse directories outside the intended scope. This can lead to unauthorized reading, modification, or deletion of files on the server hosting the CMS. The attack vector is remote network access, but exploitation requires the attacker to have high privileges (authenticated with elevated rights) on the system. No user interaction is needed, and the vulnerability impacts confidentiality, integrity, and availability at a low level due to the limited scope of path traversal and the requirement for high privileges. The vendor was notified early but has not issued a patch or response, and no known exploits have been observed in the wild yet. The CVSS 4.0 base score is 5.1 (medium severity), reflecting the moderate risk posed by this vulnerability. The lack of vendor response increases the risk of exploitation as attackers may develop exploits based on the public disclosure. Organizations running affected versions should monitor for updates and consider interim mitigations.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to those using Sanluan PublicCMS in versions up to 5.202506.d. Successful exploitation could allow attackers with administrative privileges to access or modify sensitive files, potentially leading to data breaches, defacement, or disruption of CMS operations. This could impact confidentiality by exposing sensitive configuration or content files, integrity by allowing unauthorized changes to templates or system files, and availability if critical files are deleted or corrupted. Given the requirement for high privileges, the threat is more significant in environments where administrative credentials are weakly protected or where insider threats exist. The lack of vendor patching increases exposure time. European organizations in sectors such as government, media, and e-commerce that rely on PublicCMS for content management may face operational and reputational damage if exploited. Additionally, compliance with GDPR and other data protection regulations could be jeopardized if sensitive data is exposed.

Mitigation Recommendations

1. Restrict administrative access to the CMS by enforcing strong authentication mechanisms, including multi-factor authentication (MFA) for all users with high privileges. 2. Implement network-level access controls such as IP whitelisting or VPN requirements to limit access to the administrative interface. 3. Apply strict input validation and sanitization on all file path parameters within the CMS, if possible through custom rules or web application firewalls (WAFs). 4. Monitor logs for unusual file access patterns or attempts to traverse directories. 5. Regularly audit user privileges to ensure only necessary users have high-level access. 6. Backup CMS data and configuration regularly to enable recovery in case of compromise. 7. Engage with the vendor or community for updates or patches; consider upgrading to a fixed version once available. 8. If patching is not immediately possible, consider isolating the CMS environment or deploying compensating controls such as containerization or sandboxing to limit impact.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-17T08:58:04.516Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696c7299d302b072d99c1488

Added to database: 1/18/2026, 5:41:45 AM

Last enriched: 1/25/2026, 7:37:22 PM

Last updated: 2/7/2026, 12:47:04 AM

Views: 53

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats