Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1445: Unrestricted Upload in iJason-Liu Books_Manager

0
Medium
VulnerabilityCVE-2026-1445cvecve-2026-1445
Published: Mon Jan 26 2026 (01/26/2026, 22:02:05 UTC)
Source: CVE Database V5
Vendor/Project: iJason-Liu
Product: Books_Manager

Description

A vulnerability was found in iJason-Liu Books_Manager up to 298ba736387ca37810466349af13a0fdf828e99c. This vulnerability affects unknown code of the file controllers/books_center/upload_bookCover.php. Performing a manipulation of the argument book_cover results in unrestricted upload. The attack may be initiated remotely. The exploit has been made public and could be used. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 22:30:02 UTC

Technical Analysis

CVE-2026-1445 identifies an unrestricted file upload vulnerability in the iJason-Liu Books_Manager application, specifically within the upload_bookCover.php script. The vulnerability arises due to insufficient validation or restriction on the 'book_cover' parameter, allowing an attacker to upload arbitrary files to the server. Because the vulnerability requires high privilege authentication but no user interaction, an authenticated attacker with elevated rights can exploit this remotely to upload malicious files, such as web shells or scripts, potentially leading to server compromise. The vulnerability affects the code base up to commit 298ba736387ca37810466349af13a0fdf828e99c. The product’s rolling release model means that affected versions are continuously updated, making it difficult to pinpoint exact vulnerable releases. The CVSS 4.0 score of 5.1 reflects a medium severity, considering network attack vector, low complexity, no user interaction, but requiring high privileges. Although no known exploits are currently observed in the wild, public disclosure of exploit details increases the risk of exploitation. The vulnerability could be leveraged to escalate attacks within affected environments, impacting confidentiality, integrity, and availability to a limited extent due to the required privilege level and scope of the vulnerability.

Potential Impact

The primary impact of this vulnerability is the potential for an authenticated attacker with high privileges to upload arbitrary files, which could lead to unauthorized code execution, data tampering, or denial of service. While the requirement for high privilege limits the attack surface, exploitation could allow attackers to deploy web shells or malware, pivot within the network, or disrupt application functionality. Organizations relying on iJason-Liu Books_Manager may face risks of data breaches, service interruptions, or reputational damage if the vulnerability is exploited. The rolling release nature of the product complicates patch management, potentially delaying remediation. The medium severity rating indicates moderate risk, but the presence of public exploit code increases urgency. The impact is more significant in environments where the application is internet-facing or integrated with sensitive data systems.

Mitigation Recommendations

To mitigate this vulnerability, organizations should implement strict validation and sanitization of file uploads, ensuring only allowed file types and sizes are accepted. Employ server-side checks to verify file content and use allowlists rather than blocklists. Restrict upload directories to non-executable locations and enforce least privilege on file system permissions. Monitor logs for suspicious upload activity and anomalous file changes. Apply the latest updates from the vendor promptly, even though specific patch versions are not clearly defined due to the rolling release model. If immediate patching is not possible, consider disabling the upload functionality or restricting access to the upload endpoint to trusted administrators only. Conduct regular security assessments and penetration testing focused on file upload mechanisms. Employ web application firewalls (WAFs) with rules targeting file upload abuse to provide an additional layer of defense.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-26T14:58:05.933Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6977e8c84623b1157cbefcae

Added to database: 1/26/2026, 10:20:56 PM

Last enriched: 2/23/2026, 10:30:02 PM

Last updated: 3/25/2026, 6:06:30 PM

Views: 106

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses