Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1152: Unrestricted Upload in technical-laohu mpay

0
Medium
VulnerabilityCVE-2026-1152cvecve-2026-1152
Published: Mon Jan 19 2026 (01/19/2026, 11:32:05 UTC)
Source: CVE Database V5
Vendor/Project: technical-laohu
Product: mpay

Description

A security vulnerability has been detected in technical-laohu mpay up to 1.2.4. The impacted element is an unknown function of the component QR Code Image Handler. Such manipulation of the argument codeimg leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.

AI-Powered Analysis

AILast updated: 01/26/2026, 19:51:30 UTC

Technical Analysis

CVE-2026-1152 is a security vulnerability identified in the technical-laohu mpay product, specifically affecting versions 1.2.0 through 1.2.4. The flaw exists in an unspecified function within the QR Code Image Handler component, where the argument 'codeimg' can be manipulated to perform unrestricted file uploads. This means an attacker with high privileges on the system can remotely upload arbitrary files without any user interaction or additional authentication steps. The vulnerability does not require user interaction (UI:N) and does not require privileges beyond high-level access (PR:H), which implies that the attacker must already have significant access to the system or application environment to exploit this flaw. The impact on confidentiality, integrity, and availability is limited but non-negligible (VC:L, VI:L, VA:L), indicating potential for partial data disclosure, modification, or service disruption. The vulnerability has been publicly disclosed but no known exploits have been observed in the wild at the time of publication. The CVSS 4.0 vector string AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P indicates network attack vector, low attack complexity, no authentication needed beyond high privileges, and partial impacts on security properties. The lack of available patches or vendor advisories at the time suggests that organizations must implement interim mitigations to reduce risk.

Potential Impact

For European organizations, especially those in the financial technology and payment processing sectors using technical-laohu mpay, this vulnerability poses a risk of unauthorized file uploads that could lead to partial compromise of system confidentiality, integrity, and availability. Attackers with high privileges could upload malicious files, potentially enabling further exploitation such as remote code execution, data tampering, or denial of service. This could disrupt payment services, lead to data breaches involving sensitive financial information, and damage organizational reputation. Given the network-exploitable nature of the vulnerability, organizations with exposed mpay services or insufficient internal access controls are at higher risk. The medium severity rating reflects the requirement for high privileges, which somewhat limits the attack surface but does not eliminate risk, especially in complex environments where privilege escalation or insider threats are possible.

Mitigation Recommendations

Organizations should prioritize upgrading to a version of technical-laohu mpay that addresses this vulnerability once available. In the absence of an official patch, implement strict access controls to limit high privilege accounts and restrict who can interact with the QR Code Image Handler component. Employ application-layer filtering to validate and restrict file upload types and sizes rigorously. Monitor logs and network traffic for unusual file upload activity or attempts to manipulate the 'codeimg' parameter. Conduct regular privilege audits to reduce the number of users with high-level access. Consider deploying web application firewalls (WAFs) with custom rules to detect and block suspicious upload requests targeting this component. Additionally, isolate the mpay application environment to minimize lateral movement in case of exploitation. Finally, maintain up-to-date backups and incident response plans tailored to potential file upload attacks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-18T13:59:49.380Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696e1879d302b072d9b45f4c

Added to database: 1/19/2026, 11:41:45 AM

Last enriched: 1/26/2026, 7:51:30 PM

Last updated: 2/7/2026, 12:01:10 AM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats