Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1112: Improper Authorization in Sanluan PublicCMS

0
Medium
VulnerabilityCVE-2026-1112cvecve-2026-1112
Published: Sun Jan 18 2026 (01/18/2026, 06:02:06 UTC)
Source: CVE Database V5
Vendor/Project: Sanluan
Product: PublicCMS

Description

A vulnerability was found in Sanluan PublicCMS up to 5.202506.d. Affected is the function delete of the file publiccms-trade/src/main/java/com/publiccms/controller/web/trade/TradeAddressController.java of the component Trade Address Deletion Endpoint. Performing a manipulation of the argument ids results in improper authorization. The attack may be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 22:50:13 UTC

Technical Analysis

CVE-2026-1112 is an improper authorization vulnerability identified in Sanluan PublicCMS, specifically affecting versions up to 5.202506.d. The flaw resides in the delete function of the Trade Address Deletion Endpoint, located in the TradeAddressController.java source file. The vulnerability allows an attacker to manipulate the 'ids' parameter remotely to delete trade address records without proper authorization checks. This means that an attacker with low-level privileges can bypass intended access controls and perform unauthorized deletions of trade address data. The vulnerability does not require user interaction and can be exploited over the network, increasing its risk profile. The vendor was notified early but has not issued any response or patch, and public exploit code has been released, increasing the likelihood of exploitation. The CVSS 4.0 base score is 5.3 (medium severity), reflecting the network attack vector, low attack complexity, no user interaction, and limited privileges required. The impact primarily affects data integrity and availability by enabling unauthorized deletion of critical trade address information, which could disrupt business operations and customer data management. No mitigations or patches have been published yet, making immediate risk management essential for affected organizations.

Potential Impact

The vulnerability allows unauthorized deletion of trade address data, which can lead to significant disruption in business operations relying on PublicCMS for e-commerce or trade management. Data integrity is compromised as attackers can remove legitimate address records, potentially causing transaction failures, customer dissatisfaction, and loss of trust. Availability is also impacted since critical data may be deleted, requiring recovery efforts and downtime. Although the vulnerability requires low-level privileges, the lack of proper authorization checks means attackers can escalate their impact beyond intended permissions. This could also facilitate further attacks by removing audit trails or interfering with order processing workflows. Organizations worldwide using affected PublicCMS versions face risks of operational disruption, data loss, and reputational damage. The absence of vendor response and patches increases the window of exposure, and public exploit availability raises the likelihood of active exploitation attempts.

Mitigation Recommendations

1. Immediately audit and restrict access to the Trade Address Deletion Endpoint, ensuring only fully trusted and authenticated users with verified permissions can invoke deletion operations. 2. Implement additional application-layer authorization checks as a compensating control, verifying that the user is authorized to delete each specific trade address before processing the request. 3. Monitor logs for unusual deletion requests or patterns indicating exploitation attempts, focusing on anomalous 'ids' parameter manipulations. 4. Employ Web Application Firewalls (WAF) with custom rules to detect and block suspicious requests targeting the vulnerable endpoint. 5. Isolate or segment systems running PublicCMS to limit lateral movement if exploitation occurs. 6. Develop and deploy internal patches or code fixes to enforce proper authorization if vendor patches are unavailable. 7. Regularly back up trade address data and test restoration procedures to minimize impact from unauthorized deletions. 8. Engage with the vendor or community to track patch releases and apply updates promptly once available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-17T08:58:12.479Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696c7d25d302b072d9a388f8

Added to database: 1/18/2026, 6:26:45 AM

Last enriched: 2/23/2026, 10:50:13 PM

Last updated: 3/26/2026, 4:40:07 AM

Views: 113

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses