Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2623: Path Traversal in Blossom

0
Medium
VulnerabilityCVE-2026-2623cvecve-2026-2623
Published: Tue Feb 17 2026 (02/17/2026, 21:02:39 UTC)
Source: CVE Database V5
Product: Blossom

Description

A flaw has been found in Blossom up to 1.17.1. This issue affects the function put of the file blossom-backend/common/common-iaas/src/main/java/com/blossom/common/iaas/blos/BLOSManager.java of the component File Upload. This manipulation causes path traversal. The attack may be initiated remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 23:22:01 UTC

Technical Analysis

CVE-2026-2623 is a path traversal vulnerability identified in the Blossom software, specifically in versions 1.17.0 and 1.17.1. The vulnerability resides in the put method of the BLOSManager.java file within the file upload component. Path traversal vulnerabilities occur when user-supplied input is not properly sanitized, allowing attackers to manipulate file paths to access files and directories outside the intended scope. In this case, an attacker can remotely craft requests to upload or manipulate files by specifying paths that traverse directories (e.g., using ../ sequences), potentially overwriting critical files or accessing sensitive data. The vulnerability requires low privileges (PR:L) but no user interaction (UI:N) and can be exploited over the network (AV:N) with low attack complexity (AC:L). The impact on confidentiality, integrity, and availability is limited but present, as unauthorized file access or modification can lead to information leakage or disruption of services. The vendor was contacted but did not respond, and no official patches have been released, although a public exploit exists. This increases the urgency for organizations to implement mitigations or workarounds to reduce risk.

Potential Impact

The path traversal vulnerability in Blossom could allow attackers to read or write arbitrary files on affected systems, potentially exposing sensitive information such as configuration files, credentials, or proprietary data. Unauthorized file modification could disrupt application functionality or enable further compromise, such as privilege escalation or persistent backdoors. Since the vulnerability can be exploited remotely without user interaction, it poses a significant risk to exposed Blossom instances, especially those accessible over the internet. The medium CVSS score (5.3) reflects moderate impact and ease of exploitation. Organizations relying on Blossom for critical infrastructure or data processing may face operational disruptions, data breaches, or compliance violations if exploited. The lack of vendor response and patches increases the window of exposure, making timely mitigation essential.

Mitigation Recommendations

1. Immediately restrict access to Blossom file upload interfaces to trusted networks or authenticated users only, minimizing exposure to untrusted actors. 2. Implement web application firewall (WAF) rules to detect and block path traversal patterns such as '../' sequences in file upload requests. 3. Employ input validation and sanitization at the application or proxy level to reject suspicious file path inputs before they reach Blossom. 4. Monitor logs for unusual file access or upload activity indicative of exploitation attempts. 5. If possible, isolate Blossom instances in segmented network zones to limit lateral movement in case of compromise. 6. Consider disabling or restricting the vulnerable file upload functionality temporarily until a vendor patch or official fix is available. 7. Keep backups of critical data and configurations to enable recovery from potential file tampering. 8. Engage with the vendor or community for updates or unofficial patches and apply them promptly once available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-17T10:24:12.065Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6994e1f780d747be20dad4b4

Added to database: 2/17/2026, 9:47:35 PM

Last enriched: 2/24/2026, 11:22:01 PM

Last updated: 4/7/2026, 2:19:41 AM

Views: 116

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses