Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22786: CWE-434: Unrestricted Upload of File with Dangerous Type in flipped-aurora gin-vue-admin

0
High
VulnerabilityCVE-2026-22786cvecve-2026-22786cwe-434cwe-22
Published: Mon Jan 12 2026 (01/12/2026, 21:09:01 UTC)
Source: CVE Database V5
Vendor/Project: flipped-aurora
Product: gin-vue-admin

Description

Gin-vue-admin is a backstage management system based on vue and gin. Gin-vue-admin <= v2.8.7 has a path traversal vulnerability in the breakpoint resume upload functionality. Attacker can upload any files on any directory. In the breakpoint_continue.go file, the MakeFile function accepts a fileName parameter through the /fileUploadAndDownload/breakpointContinueFinish API endpoint and directly concatenates it with the base directory path (./fileDir/) using os.OpenFile() without any validation for directory traversal sequences (e.g., ../). An attacker with file upload privileges could exploit this vulnerability.

AI-Powered Analysis

AILast updated: 01/12/2026, 21:38:04 UTC

Technical Analysis

CVE-2026-22786 is a path traversal vulnerability affecting the open-source backend management system gin-vue-admin, specifically versions up to 2.8.7. The flaw resides in the breakpoint resume upload feature implemented in the breakpoint_continue.go file. The MakeFile function accepts a filename parameter via the /fileUploadAndDownload/breakpointContinueFinish API endpoint and concatenates it directly with a base directory path (./fileDir/) using os.OpenFile() without sanitizing or validating the filename input. This lack of validation allows attackers to include directory traversal sequences such as '../' in the filename, enabling them to write files outside the intended directory. An attacker with file upload privileges can exploit this to place arbitrary files anywhere on the server's filesystem accessible by the application process. Potential consequences include overwriting critical files, uploading malicious scripts, or implanting backdoors, which could lead to remote code execution or full system compromise. The vulnerability requires authenticated access with file upload rights but does not require user interaction, increasing its risk in environments where such privileges are granted. Although no known exploits have been reported in the wild, the vulnerability's CVSS 4.0 base score is 7.3 (high), reflecting its significant impact and ease of exploitation once authenticated. The vulnerability is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) and CWE-22 (Path Traversal). No official patches were linked at the time of publication, so mitigation relies on input validation and access control measures until updates are available.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those using gin-vue-admin in critical backend management roles. Successful exploitation could lead to unauthorized file uploads outside designated directories, enabling attackers to overwrite configuration files, upload web shells, or implant malware. This compromises confidentiality, integrity, and availability of affected systems. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that rely on gin-vue-admin for administrative interfaces could face data breaches, service disruptions, or ransomware attacks. The requirement for authenticated access limits exposure but does not eliminate risk, as insider threats or compromised credentials could facilitate exploitation. The lack of user interaction needed further increases the threat level. Given the widespread use of Vue and Gin frameworks in Europe, and the open-source nature of gin-vue-admin, the vulnerability could be leveraged in targeted attacks or automated campaigns once exploit code becomes available.

Mitigation Recommendations

European organizations should immediately audit their use of gin-vue-admin and identify instances running version 2.8.7 or earlier. Until an official patch is released, implement strict input validation on the filename parameter to reject any directory traversal sequences such as '../' or absolute paths. Enforce file upload restrictions to limit uploads to a dedicated, non-executable directory with minimal permissions. Employ application-level access controls to restrict file upload privileges to trusted users only. Monitor logs for suspicious file upload activity, especially attempts to upload files outside the intended directory. Consider deploying Web Application Firewalls (WAFs) with rules to detect and block path traversal patterns in upload requests. Regularly update and patch gin-vue-admin once a fix is available from the vendor or community. Conduct security awareness training to reduce the risk of credential compromise that could enable exploitation. Finally, perform periodic security assessments and penetration tests focusing on file upload functionalities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-09T18:27:19.388Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69656661da2266e838286f98

Added to database: 1/12/2026, 9:23:45 PM

Last enriched: 1/12/2026, 9:38:04 PM

Last updated: 1/13/2026, 12:27:51 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats