Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2665: Unrestricted Upload in huanzi-qch base-admin

0
Medium
VulnerabilityCVE-2026-2665cvecve-2026-2665
Published: Wed Feb 18 2026 (02/18/2026, 20:02:07 UTC)
Source: CVE Database V5
Vendor/Project: huanzi-qch
Product: base-admin

Description

A vulnerability was detected in huanzi-qch base-admin up to 57a8126bb3353a004f3c7722089e3b926ea83596. Impacted is the function Upload of the file SysFileController.java of the component JSP Parser. Performing a manipulation of the argument File results in unrestricted upload. The attack can be initiated remotely. The exploit is now public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The project was informed of the problem early through an issue report but has not responded yet.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 13:37:34 UTC

Technical Analysis

CVE-2026-2665 identifies a security weakness in the huanzi-qch base-admin software, a product that appears to be used for administrative or management purposes. The vulnerability resides in the Upload function of the SysFileController.java file, part of the JSP Parser component. The flaw arises from improper handling and validation of the File argument, allowing attackers to perform unrestricted file uploads remotely. This means an attacker can upload malicious files, such as web shells or malware, without authentication or user interaction, potentially leading to remote code execution or persistent compromise. The product employs continuous delivery with rolling releases, which means traditional versioning is less clear, and no specific patched versions are currently available. The vulnerability was responsibly disclosed early, but the vendor has not yet responded or provided a patch. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges or user interaction required, and low impact on confidentiality, integrity, and availability, resulting in a medium severity score of 5.3. No known exploits are currently observed in the wild, but public exploit code exists, increasing the risk of exploitation. The lack of vendor response and patch availability heightens the urgency for organizations to apply mitigations.

Potential Impact

The unrestricted file upload vulnerability can have significant impacts on affected organizations. Attackers can upload arbitrary files, potentially leading to remote code execution, unauthorized access, data leakage, or service disruption. This compromises confidentiality, integrity, and availability of systems running the vulnerable software. Since exploitation requires no authentication or user interaction, the attack surface is broad, allowing automated attacks from anywhere on the internet. Organizations relying on huanzi-qch base-admin for critical administrative functions risk operational disruption and data breaches. The continuous delivery model complicates patch management, increasing exposure time. While the CVSS score is medium, the real-world impact could escalate if attackers leverage uploaded files to pivot deeper into networks or deploy ransomware. The absence of vendor patches and public exploit availability further elevates risk, making timely mitigation essential to prevent potential compromise.

Mitigation Recommendations

Given the absence of official patches, organizations should implement immediate compensating controls. First, restrict access to the Upload function by enforcing network-level controls such as IP whitelisting or VPN-only access. Second, deploy web application firewalls (WAFs) with rules to detect and block suspicious file upload patterns or known malicious payloads. Third, implement strict server-side validation to restrict allowed file types, sizes, and content, ideally limiting uploads to safe formats only. Fourth, isolate the upload directory with minimal permissions and disable execution rights to prevent uploaded files from being executed as code. Fifth, monitor logs and file system changes for unusual activity related to file uploads. Finally, maintain continuous threat intelligence monitoring for any emerging exploits and prepare for rapid patch deployment once the vendor releases an update. Organizations should also consider alternative software solutions if the vendor remains unresponsive.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-18T08:56:57.505Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6996fb458fb9188dea8c0132

Added to database: 2/19/2026, 12:00:05 PM

Last enriched: 2/28/2026, 1:37:34 PM

Last updated: 4/6/2026, 10:25:16 PM

Views: 48

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses