Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22786: CWE-434: Unrestricted Upload of File with Dangerous Type in flipped-aurora gin-vue-admin

0
High
VulnerabilityCVE-2026-22786cvecve-2026-22786cwe-434cwe-22
Published: Mon Jan 12 2026 (01/12/2026, 21:09:01 UTC)
Source: CVE Database V5
Vendor/Project: flipped-aurora
Product: gin-vue-admin

Description

CVE-2026-22786 is a high-severity vulnerability in gin-vue-admin versions up to 2. 8. 7 that allows an attacker with file upload privileges to perform unrestricted file uploads via a path traversal flaw. The vulnerability exists in the breakpoint resume upload functionality where the filename parameter is concatenated directly with a base directory path without validation, enabling directory traversal attacks. Exploitation can lead to arbitrary file writes anywhere on the server filesystem, potentially resulting in code execution, data compromise, or service disruption. No user interaction or authentication bypass is required beyond having upload privileges. Although no known exploits are reported in the wild yet, the vulnerability's characteristics make it a significant risk for organizations using this software. European organizations relying on gin-vue-admin for backend management should prioritize patching or mitigating this issue to prevent potential attacks. Countries with higher adoption of gin-vue-admin or critical infrastructure using it are at greater risk. Immediate mitigation includes restricting file upload permissions, validating and sanitizing file paths, and monitoring for suspicious file activity.

AI-Powered Analysis

AILast updated: 01/21/2026, 03:01:53 UTC

Technical Analysis

CVE-2026-22786 affects the flipped-aurora gin-vue-admin project, a backend management system built on Vue.js and Gin framework. Versions up to 2.8.7 contain a path traversal vulnerability in the breakpoint resume upload feature. Specifically, the vulnerability resides in the MakeFile function within breakpoint_continue.go, where the filename parameter received via the /fileUploadAndDownload/breakpointContinueFinish API endpoint is concatenated directly with the base directory path './fileDir/' using os.OpenFile() without any sanitization or validation against directory traversal sequences such as '../'. This lack of validation allows an attacker with legitimate file upload privileges to craft filenames containing traversal sequences, enabling them to write files outside the intended directory, potentially anywhere on the server filesystem. This can lead to arbitrary file upload, allowing attackers to place malicious files, overwrite critical files, or implant web shells, which can compromise confidentiality, integrity, and availability of the system. The vulnerability is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) and CWE-22 (Path Traversal). The CVSS v4.0 score is 7.3 (high severity), reflecting network attack vector, low attack complexity, no user interaction, but requiring privileges to upload files. No known exploits have been reported in the wild yet, but the vulnerability's nature makes it a prime target for exploitation once weaponized. The issue affects all deployments using gin-vue-admin versions up to 2.8.7, which are commonly used in enterprise and government backend management systems.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially for those using gin-vue-admin as part of their internal or external management infrastructure. Successful exploitation can lead to arbitrary file writes, enabling attackers to deploy web shells or malware, escalate privileges, exfiltrate sensitive data, or disrupt services. This can result in data breaches, operational downtime, and reputational damage. Critical sectors such as finance, healthcare, government, and manufacturing that rely on gin-vue-admin for administrative interfaces are particularly vulnerable. Given the high severity and ease of exploitation by any user with upload privileges, the threat could facilitate lateral movement within networks and persistent footholds. The absence of known exploits in the wild currently provides a window for proactive mitigation. However, the vulnerability's presence in open-source software used globally means European organizations must act swiftly to prevent potential targeted attacks or opportunistic exploitation by cybercriminals or state-sponsored actors.

Mitigation Recommendations

1. Immediately upgrade gin-vue-admin to a version later than 2.8.7 once a patch is available from the vendor or community. 2. Until a patch is applied, restrict file upload permissions strictly to trusted users and roles to minimize exposure. 3. Implement server-side validation and sanitization of all file upload parameters, particularly the filename, to reject any directory traversal sequences such as '../' or absolute paths. 4. Employ application-layer controls to enforce allowed file types and sizes to reduce risk of malicious payloads. 5. Use containerization or sandboxing to isolate the file upload directory from critical system paths. 6. Monitor file system activity for unusual file creation or modification outside expected directories. 7. Conduct regular audits of uploaded files and system logs to detect potential exploitation attempts. 8. Harden server configurations to prevent execution of uploaded files in upload directories. 9. Educate developers and administrators about secure file handling practices to prevent similar vulnerabilities. 10. Deploy web application firewalls (WAFs) with rules to detect and block path traversal attack patterns targeting the vulnerable endpoint.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-09T18:27:19.388Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69656661da2266e838286f98

Added to database: 1/12/2026, 9:23:45 PM

Last enriched: 1/21/2026, 3:01:53 AM

Last updated: 2/4/2026, 1:35:09 AM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats