Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22789: CWE-434: Unrestricted Upload of File with Dangerous Type in SMEWebify WebErpMesv2

0
Medium
VulnerabilityCVE-2026-22789cvecve-2026-22789cwe-434cwe-616
Published: Mon Jan 12 2026 (01/12/2026, 21:52:11 UTC)
Source: CVE Database V5
Vendor/Project: SMEWebify
Product: WebErpMesv2

Description

CVE-2026-22789 is a medium-severity vulnerability in SMEWebify's WebErpMesv2 versions prior to 1. 19. It allows authenticated users to bypass file upload validation in multiple controllers, enabling the upload of arbitrary files including PHP scripts. This can lead to remote code execution (RCE) on the affected system. The vulnerability is similar to CVE-2025-52130 but affects different code paths not fixed by the previous patch. Exploitation requires authentication but no user interaction beyond that. The vulnerability impacts confidentiality and integrity but not availability. No known exploits are currently reported in the wild. The issue is fixed in version 1. 19.

AI-Powered Analysis

AILast updated: 01/12/2026, 22:08:37 UTC

Technical Analysis

CVE-2026-22789 is a file upload validation bypass vulnerability found in SMEWebify's WebErpMesv2, a web-based resource management and manufacturing execution system widely used in industrial environments. Versions prior to 1.19 contain multiple vulnerable controllers that fail to properly validate uploaded files, allowing authenticated users to upload arbitrary files, including executable PHP scripts. This flaw enables remote code execution (RCE), where an attacker can execute arbitrary commands on the server hosting the application. The vulnerability is categorized under CWE-434 (Unrestricted Upload of File with Dangerous Type) and CWE-616 (Incomplete Escape Sequence or Encoding). It is similar in nature to CVE-2025-52130 but affects different parts of the codebase that were not addressed by the previous patch, indicating incomplete remediation. Exploitation requires the attacker to have valid credentials (low privilege required) but does not require additional user interaction. The CVSS 3.1 base score is 5.4 (medium), reflecting network attack vector, low attack complexity, and partial impact on confidentiality and integrity, but no impact on availability. No public exploits or active exploitation have been reported yet. The vulnerability was publicly disclosed on January 12, 2026, and fixed in version 1.19 of WebErpMesv2. Organizations running affected versions should upgrade immediately to mitigate risk.

Potential Impact

For European organizations, especially those in manufacturing and industrial sectors relying on WebErpMesv2, this vulnerability poses a significant risk. Successful exploitation can lead to unauthorized access to sensitive operational data, intellectual property, and potentially allow attackers to manipulate manufacturing processes or disrupt supply chains. The ability to execute arbitrary code on the server can also facilitate lateral movement within the network, data exfiltration, or deployment of ransomware. Given the critical role of manufacturing execution systems in production continuity, even partial compromise of confidentiality and integrity can have severe operational and financial consequences. The requirement for authentication limits exposure somewhat, but insider threats or compromised credentials could be leveraged by attackers. The lack of known exploits in the wild currently reduces immediate risk but does not preclude targeted attacks. European organizations with legacy or unpatched WebErpMesv2 deployments are particularly vulnerable.

Mitigation Recommendations

1. Immediate upgrade to WebErpMesv2 version 1.19 or later, where the vulnerability is fixed. 2. Implement strict access controls and multi-factor authentication (MFA) to reduce risk of credential compromise, as exploitation requires authentication. 3. Conduct an audit of user accounts and permissions to ensure least privilege principles are enforced. 4. Monitor file upload activity and web server logs for unusual or unauthorized uploads, especially PHP or other executable scripts. 5. Employ web application firewalls (WAF) with custom rules to detect and block suspicious file uploads targeting vulnerable endpoints. 6. Isolate the WebErpMesv2 application server from critical network segments to limit lateral movement if compromised. 7. Regularly back up critical data and test incident response plans to quickly recover from potential attacks. 8. Educate users on secure credential management to prevent insider threats or phishing leading to account compromise. 9. Engage in vulnerability scanning and penetration testing focused on file upload functionalities to detect similar issues proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-09T18:27:19.388Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69656d69da2266e8382e9812

Added to database: 1/12/2026, 9:53:45 PM

Last enriched: 1/12/2026, 10:08:37 PM

Last updated: 1/13/2026, 12:27:26 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats