Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22789: CWE-434: Unrestricted Upload of File with Dangerous Type in SMEWebify WebErpMesv2

0
Medium
VulnerabilityCVE-2026-22789cvecve-2026-22789cwe-434cwe-616
Published: Mon Jan 12 2026 (01/12/2026, 21:52:11 UTC)
Source: CVE Database V5
Vendor/Project: SMEWebify
Product: WebErpMesv2

Description

CVE-2026-22789 is a medium-severity vulnerability in SMEWebify's WebErpMesv2 versions prior to 1. 19 that allows authenticated users to bypass file upload validation and upload arbitrary files, including PHP scripts. This can lead to remote code execution (RCE) on the affected system. The flaw exists in multiple controllers and is similar to CVE-2025-52130 but in different code locations not fixed previously. Exploitation requires authentication but no user interaction beyond that. The vulnerability impacts confidentiality and integrity but not availability, with a CVSS score of 5. 4. No known exploits are currently reported in the wild. European organizations using WebErpMesv2 in manufacturing or resource management should prioritize upgrading to version 1. 19 or later to mitigate risk.

AI-Powered Analysis

AILast updated: 01/21/2026, 03:00:52 UTC

Technical Analysis

CVE-2026-22789 is a file upload validation bypass vulnerability affecting SMEWebify's WebErpMesv2, a web-based resource management and manufacturing execution system widely used in industrial environments. Versions prior to 1.19 contain a flaw in multiple controllers that allows authenticated users to upload arbitrary files without proper validation of file types. This includes the ability to upload executable PHP scripts, which can be executed on the server, leading to remote code execution (RCE). The vulnerability is a variant of CVE-2025-52130 but affects different parts of the codebase that were not addressed by the previous patch, indicating incomplete remediation. The vulnerability is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) and CWE-616 (Incomplete Fix). Exploitation requires the attacker to have valid credentials (authenticated access) but does not require additional user interaction. The CVSS v3.1 base score is 5.4, reflecting medium severity due to network attack vector, low attack complexity, and privileges required. The impact primarily affects confidentiality and integrity, as attackers can execute arbitrary code and potentially access sensitive data or manipulate system operations. Availability is not directly impacted. No public exploits have been reported yet, but the presence of RCE potential makes this a significant risk if exploited. The vulnerability was published on January 12, 2026, and fixed in version 1.19 of WebErpMesv2. Organizations running earlier versions should consider this a priority patching candidate.

Potential Impact

For European organizations, especially those in manufacturing, industrial resource management, and supply chain sectors using WebErpMesv2, this vulnerability poses a significant risk. Successful exploitation could allow attackers to execute arbitrary code on critical systems, potentially leading to data breaches, intellectual property theft, sabotage of manufacturing processes, or lateral movement within corporate networks. The confidentiality and integrity of sensitive operational data could be compromised, affecting production quality and business continuity. Given the industrial focus of the product, disruption or manipulation of manufacturing execution systems could have downstream effects on supply chains and operational safety. While availability is not directly impacted by this vulnerability, the consequences of unauthorized code execution could indirectly cause downtime or degraded service. The requirement for authenticated access limits exposure to internal or credential-compromised attackers but does not eliminate risk, especially in environments with weak access controls or phishing susceptibility. European organizations with stringent regulatory requirements around data protection and operational security must address this vulnerability promptly to avoid compliance issues and reputational damage.

Mitigation Recommendations

1. Upgrade WebErpMesv2 to version 1.19 or later immediately, as this version contains the official fix for the vulnerability. 2. Enforce strict access control policies to limit authenticated user privileges, ensuring only trusted personnel have upload permissions. 3. Implement multi-factor authentication (MFA) to reduce the risk of credential compromise. 4. Monitor and log all file upload activities, focusing on unusual file types or upload patterns, and establish alerts for suspicious behavior. 5. Employ web application firewalls (WAF) with custom rules to detect and block attempts to upload executable scripts or files with dangerous extensions. 6. Conduct regular security audits and penetration testing focused on file upload functionalities. 7. Educate users on secure credential management and phishing awareness to reduce the risk of account compromise. 8. Isolate the WebErpMesv2 application environment to limit the impact of potential exploitation, such as running it in a container or segmented network zone. 9. Review and harden server configurations to prevent execution of uploaded files in upload directories, for example by disabling script execution in upload folders. 10. Maintain up-to-date backups and incident response plans tailored to manufacturing execution system environments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-09T18:27:19.388Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69656d69da2266e8382e9812

Added to database: 1/12/2026, 9:53:45 PM

Last enriched: 1/21/2026, 3:00:52 AM

Last updated: 2/5/2026, 7:23:29 PM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats