CVE-2026-2665: Unrestricted Upload in huanzi-qch base-admin
A vulnerability was detected in huanzi-qch base-admin up to 57a8126bb3353a004f3c7722089e3b926ea83596. Impacted is the function Upload of the file SysFileController.java of the component JSP Parser. Performing a manipulation of the argument File results in unrestricted upload. The attack can be initiated remotely. The exploit is now public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The project was informed of the problem early through an issue report but has not responded yet.
AI Analysis
Technical Summary
CVE-2026-2665 identifies a security weakness in the huanzi-qch base-admin software, a product that appears to be used for administrative or management purposes. The vulnerability resides in the Upload function of the SysFileController.java file, part of the JSP Parser component. The flaw arises from improper handling and validation of the File argument, allowing attackers to perform unrestricted file uploads remotely. This means an attacker can upload malicious files, such as web shells or malware, without authentication or user interaction, potentially leading to remote code execution or persistent compromise. The product employs continuous delivery with rolling releases, which means traditional versioning is less clear, and no specific patched versions are currently available. The vulnerability was responsibly disclosed early, but the vendor has not yet responded or provided a patch. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges or user interaction required, and low impact on confidentiality, integrity, and availability, resulting in a medium severity score of 5.3. No known exploits are currently observed in the wild, but public exploit code exists, increasing the risk of exploitation. The lack of vendor response and patch availability heightens the urgency for organizations to apply mitigations.
Potential Impact
The unrestricted file upload vulnerability can have significant impacts on affected organizations. Attackers can upload arbitrary files, potentially leading to remote code execution, unauthorized access, data leakage, or service disruption. This compromises confidentiality, integrity, and availability of systems running the vulnerable software. Since exploitation requires no authentication or user interaction, the attack surface is broad, allowing automated attacks from anywhere on the internet. Organizations relying on huanzi-qch base-admin for critical administrative functions risk operational disruption and data breaches. The continuous delivery model complicates patch management, increasing exposure time. While the CVSS score is medium, the real-world impact could escalate if attackers leverage uploaded files to pivot deeper into networks or deploy ransomware. The absence of vendor patches and public exploit availability further elevates risk, making timely mitigation essential to prevent potential compromise.
Mitigation Recommendations
Given the absence of official patches, organizations should implement immediate compensating controls. First, restrict access to the Upload function by enforcing network-level controls such as IP whitelisting or VPN-only access. Second, deploy web application firewalls (WAFs) with rules to detect and block suspicious file upload patterns or known malicious payloads. Third, implement strict server-side validation to restrict allowed file types, sizes, and content, ideally limiting uploads to safe formats only. Fourth, isolate the upload directory with minimal permissions and disable execution rights to prevent uploaded files from being executed as code. Fifth, monitor logs and file system changes for unusual activity related to file uploads. Finally, maintain continuous threat intelligence monitoring for any emerging exploits and prepare for rapid patch deployment once the vendor releases an update. Organizations should also consider alternative software solutions if the vendor remains unresponsive.
Affected Countries
China, India, United States, Singapore, Malaysia, South Korea, Japan, Vietnam, Indonesia
CVE-2026-2665: Unrestricted Upload in huanzi-qch base-admin
Description
A vulnerability was detected in huanzi-qch base-admin up to 57a8126bb3353a004f3c7722089e3b926ea83596. Impacted is the function Upload of the file SysFileController.java of the component JSP Parser. Performing a manipulation of the argument File results in unrestricted upload. The attack can be initiated remotely. The exploit is now public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The project was informed of the problem early through an issue report but has not responded yet.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-2665 identifies a security weakness in the huanzi-qch base-admin software, a product that appears to be used for administrative or management purposes. The vulnerability resides in the Upload function of the SysFileController.java file, part of the JSP Parser component. The flaw arises from improper handling and validation of the File argument, allowing attackers to perform unrestricted file uploads remotely. This means an attacker can upload malicious files, such as web shells or malware, without authentication or user interaction, potentially leading to remote code execution or persistent compromise. The product employs continuous delivery with rolling releases, which means traditional versioning is less clear, and no specific patched versions are currently available. The vulnerability was responsibly disclosed early, but the vendor has not yet responded or provided a patch. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges or user interaction required, and low impact on confidentiality, integrity, and availability, resulting in a medium severity score of 5.3. No known exploits are currently observed in the wild, but public exploit code exists, increasing the risk of exploitation. The lack of vendor response and patch availability heightens the urgency for organizations to apply mitigations.
Potential Impact
The unrestricted file upload vulnerability can have significant impacts on affected organizations. Attackers can upload arbitrary files, potentially leading to remote code execution, unauthorized access, data leakage, or service disruption. This compromises confidentiality, integrity, and availability of systems running the vulnerable software. Since exploitation requires no authentication or user interaction, the attack surface is broad, allowing automated attacks from anywhere on the internet. Organizations relying on huanzi-qch base-admin for critical administrative functions risk operational disruption and data breaches. The continuous delivery model complicates patch management, increasing exposure time. While the CVSS score is medium, the real-world impact could escalate if attackers leverage uploaded files to pivot deeper into networks or deploy ransomware. The absence of vendor patches and public exploit availability further elevates risk, making timely mitigation essential to prevent potential compromise.
Mitigation Recommendations
Given the absence of official patches, organizations should implement immediate compensating controls. First, restrict access to the Upload function by enforcing network-level controls such as IP whitelisting or VPN-only access. Second, deploy web application firewalls (WAFs) with rules to detect and block suspicious file upload patterns or known malicious payloads. Third, implement strict server-side validation to restrict allowed file types, sizes, and content, ideally limiting uploads to safe formats only. Fourth, isolate the upload directory with minimal permissions and disable execution rights to prevent uploaded files from being executed as code. Fifth, monitor logs and file system changes for unusual activity related to file uploads. Finally, maintain continuous threat intelligence monitoring for any emerging exploits and prepare for rapid patch deployment once the vendor releases an update. Organizations should also consider alternative software solutions if the vendor remains unresponsive.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-18T08:56:57.505Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6996fb458fb9188dea8c0132
Added to database: 2/19/2026, 12:00:05 PM
Last enriched: 2/28/2026, 1:37:34 PM
Last updated: 4/6/2026, 10:25:16 PM
Views: 48
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.