CVE-2026-1112: Improper Authorization in Sanluan PublicCMS
A vulnerability was found in Sanluan PublicCMS up to 5.202506.d. Affected is the function delete of the file publiccms-trade/src/main/java/com/publiccms/controller/web/trade/TradeAddressController.java of the component Trade Address Deletion Endpoint. Performing a manipulation of the argument ids results in improper authorization. The attack may be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2026-1112 is an improper authorization vulnerability identified in Sanluan PublicCMS, specifically affecting versions up to 5.202506.d. The flaw resides in the 'delete' function of the Trade Address Deletion Endpoint implemented in the TradeAddressController.java file. By manipulating the 'ids' parameter, an attacker can remotely invoke deletion operations on trade address records without proper authorization checks. This bypass of access control allows unauthorized users to delete critical trade address data, potentially disrupting business operations reliant on accurate trade information. The vulnerability requires no authentication or user interaction, making it remotely exploitable over the network with low attack complexity. The CVSS 4.0 score of 5.3 reflects a medium severity, considering the impact on data integrity and availability, and the lack of required privileges or interaction. The vendor was notified early but has not issued a patch or response, and while no active exploitation has been observed, public exploit code availability increases the risk of future attacks. This vulnerability is particularly concerning for organizations using PublicCMS for managing trade or e-commerce data, as unauthorized deletions could lead to operational disruptions, data loss, and potential compliance issues.
Potential Impact
For European organizations, the improper authorization vulnerability in PublicCMS could lead to unauthorized deletion of trade address data, impacting data integrity and availability. This may disrupt order processing, logistics, and customer relationship management, especially for businesses relying on PublicCMS for e-commerce or trade operations. The loss or tampering of trade address information could result in shipment errors, financial losses, and damage to customer trust. Additionally, organizations subject to data protection regulations like GDPR may face compliance risks if data integrity is compromised. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, particularly targeting publicly accessible CMS instances. Operational downtime and recovery costs could be significant, especially if backups are not current or comprehensive. The lack of vendor response complicates remediation efforts, potentially prolonging exposure and increasing risk.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement compensating controls immediately. These include restricting network access to the PublicCMS Trade Address Deletion Endpoint via firewall rules or web application firewalls (WAF) to limit exposure to trusted IP addresses. Implement strict monitoring and alerting on deletion requests to detect anomalous activity. Employ application-layer access controls or reverse proxies to enforce authorization checks externally if possible. Regularly back up trade address data and verify backup integrity to enable rapid restoration if unauthorized deletions occur. Consider temporarily disabling the vulnerable deletion functionality if business processes allow. Engage in active threat hunting and log analysis to identify any exploitation attempts. Organizations should also maintain communication channels with the vendor and monitor for any future patches or advisories. Finally, educate internal teams about the vulnerability to ensure rapid incident response if exploitation is detected.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2026-1112: Improper Authorization in Sanluan PublicCMS
Description
A vulnerability was found in Sanluan PublicCMS up to 5.202506.d. Affected is the function delete of the file publiccms-trade/src/main/java/com/publiccms/controller/web/trade/TradeAddressController.java of the component Trade Address Deletion Endpoint. Performing a manipulation of the argument ids results in improper authorization. The attack may be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2026-1112 is an improper authorization vulnerability identified in Sanluan PublicCMS, specifically affecting versions up to 5.202506.d. The flaw resides in the 'delete' function of the Trade Address Deletion Endpoint implemented in the TradeAddressController.java file. By manipulating the 'ids' parameter, an attacker can remotely invoke deletion operations on trade address records without proper authorization checks. This bypass of access control allows unauthorized users to delete critical trade address data, potentially disrupting business operations reliant on accurate trade information. The vulnerability requires no authentication or user interaction, making it remotely exploitable over the network with low attack complexity. The CVSS 4.0 score of 5.3 reflects a medium severity, considering the impact on data integrity and availability, and the lack of required privileges or interaction. The vendor was notified early but has not issued a patch or response, and while no active exploitation has been observed, public exploit code availability increases the risk of future attacks. This vulnerability is particularly concerning for organizations using PublicCMS for managing trade or e-commerce data, as unauthorized deletions could lead to operational disruptions, data loss, and potential compliance issues.
Potential Impact
For European organizations, the improper authorization vulnerability in PublicCMS could lead to unauthorized deletion of trade address data, impacting data integrity and availability. This may disrupt order processing, logistics, and customer relationship management, especially for businesses relying on PublicCMS for e-commerce or trade operations. The loss or tampering of trade address information could result in shipment errors, financial losses, and damage to customer trust. Additionally, organizations subject to data protection regulations like GDPR may face compliance risks if data integrity is compromised. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, particularly targeting publicly accessible CMS instances. Operational downtime and recovery costs could be significant, especially if backups are not current or comprehensive. The lack of vendor response complicates remediation efforts, potentially prolonging exposure and increasing risk.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement compensating controls immediately. These include restricting network access to the PublicCMS Trade Address Deletion Endpoint via firewall rules or web application firewalls (WAF) to limit exposure to trusted IP addresses. Implement strict monitoring and alerting on deletion requests to detect anomalous activity. Employ application-layer access controls or reverse proxies to enforce authorization checks externally if possible. Regularly back up trade address data and verify backup integrity to enable rapid restoration if unauthorized deletions occur. Consider temporarily disabling the vulnerable deletion functionality if business processes allow. Engage in active threat hunting and log analysis to identify any exploitation attempts. Organizations should also maintain communication channels with the vendor and monitor for any future patches or advisories. Finally, educate internal teams about the vulnerability to ensure rapid incident response if exploitation is detected.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-01-17T08:58:12.479Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 696c7d25d302b072d9a388f8
Added to database: 1/18/2026, 6:26:45 AM
Last enriched: 1/18/2026, 6:41:03 AM
Last updated: 1/18/2026, 9:14:32 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15536: Heap-based Buffer Overflow in BYVoid OpenCC
MediumWireshark 4.6.3 Released, (Sat, Jan 17th)
Medium"How many states are there in the United States?", (Sun, Jan 18th)
MediumTennessee Man Pleads Guilty to Repeatedly Hacking Supreme Court’s Filing System
MediumBlack Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.