CVE-2026-2672: Path Traversal in Tsinghua Unigroup Electronic Archives System
A security flaw has been discovered in Tsinghua Unigroup Electronic Archives System 3.2.210802(62532). Affected by this vulnerability is the function Download of the file /Search/Subject/downLoad. Performing a manipulation of the argument path results in path traversal. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2026-2672 is a path traversal vulnerability identified in the Tsinghua Unigroup Electronic Archives System version 3.2.210802(62532). The vulnerability resides in the Download function accessible via the /Search/Subject/downLoad endpoint. Specifically, the function improperly sanitizes or validates the 'path' parameter, allowing an attacker to manipulate this argument to traverse directories outside the intended file storage area. This enables unauthorized access to arbitrary files on the server's filesystem. The attack vector is remote network access without requiring authentication or user interaction, making exploitation relatively straightforward. The vulnerability has a CVSS 4.0 base score of 5.3, reflecting medium severity due to limited impact on confidentiality and no direct impact on integrity or availability. The vendor was informed early but has not issued a patch or mitigation guidance. Public exploit code is available, increasing the likelihood of exploitation attempts. This vulnerability could lead to sensitive data disclosure, including configuration files, credentials, or other protected documents stored on the system. Given the nature of electronic archives, the exposure of confidential organizational or personal data is a significant concern. The lack of vendor response and patch availability necessitates immediate defensive actions by affected organizations.
Potential Impact
The primary impact of CVE-2026-2672 is unauthorized disclosure of sensitive information stored on servers running the affected version of the Tsinghua Unigroup Electronic Archives System. Attackers exploiting this path traversal can access arbitrary files, potentially including confidential documents, user data, system configuration files, or credentials. This can lead to data breaches, loss of privacy, and potential further compromise if sensitive credentials or keys are exposed. Although the vulnerability does not directly affect system integrity or availability, the exposure of critical information can facilitate subsequent attacks such as privilege escalation or lateral movement within a network. Organizations relying on this electronic archives system, especially those handling sensitive or regulated data, face reputational damage, compliance violations, and operational risks. The availability of public exploit code increases the risk of opportunistic attacks, especially in environments with internet-facing instances of the affected software. The lack of vendor patching prolongs exposure and complicates remediation efforts.
Mitigation Recommendations
1. Immediately restrict external access to the /Search/Subject/downLoad endpoint via network controls such as firewalls or web application firewalls (WAFs) to limit exposure. 2. Implement input validation and sanitization at the application or proxy level to block path traversal patterns (e.g., '..', '%2e%2e', or other encoded traversal sequences) in the 'path' parameter. 3. Employ strict access controls and file system permissions on the server to ensure that the application process cannot access sensitive files outside its designated directories. 4. Monitor logs for suspicious requests targeting the vulnerable endpoint, especially those containing traversal sequences, and respond promptly to potential exploitation attempts. 5. If feasible, isolate the affected system in a segmented network zone to reduce the blast radius of a potential breach. 6. Engage with the vendor for updates or patches and track any future advisories. 7. Consider deploying runtime application self-protection (RASP) or intrusion detection systems (IDS) capable of detecting and blocking path traversal attacks. 8. As a longer-term measure, plan for an upgrade or replacement of the affected software with a version that addresses this vulnerability once available.
Affected Countries
China, United States, India, Russia, South Korea, Japan, Germany, United Kingdom, France, Singapore
CVE-2026-2672: Path Traversal in Tsinghua Unigroup Electronic Archives System
Description
A security flaw has been discovered in Tsinghua Unigroup Electronic Archives System 3.2.210802(62532). Affected by this vulnerability is the function Download of the file /Search/Subject/downLoad. Performing a manipulation of the argument path results in path traversal. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-2672 is a path traversal vulnerability identified in the Tsinghua Unigroup Electronic Archives System version 3.2.210802(62532). The vulnerability resides in the Download function accessible via the /Search/Subject/downLoad endpoint. Specifically, the function improperly sanitizes or validates the 'path' parameter, allowing an attacker to manipulate this argument to traverse directories outside the intended file storage area. This enables unauthorized access to arbitrary files on the server's filesystem. The attack vector is remote network access without requiring authentication or user interaction, making exploitation relatively straightforward. The vulnerability has a CVSS 4.0 base score of 5.3, reflecting medium severity due to limited impact on confidentiality and no direct impact on integrity or availability. The vendor was informed early but has not issued a patch or mitigation guidance. Public exploit code is available, increasing the likelihood of exploitation attempts. This vulnerability could lead to sensitive data disclosure, including configuration files, credentials, or other protected documents stored on the system. Given the nature of electronic archives, the exposure of confidential organizational or personal data is a significant concern. The lack of vendor response and patch availability necessitates immediate defensive actions by affected organizations.
Potential Impact
The primary impact of CVE-2026-2672 is unauthorized disclosure of sensitive information stored on servers running the affected version of the Tsinghua Unigroup Electronic Archives System. Attackers exploiting this path traversal can access arbitrary files, potentially including confidential documents, user data, system configuration files, or credentials. This can lead to data breaches, loss of privacy, and potential further compromise if sensitive credentials or keys are exposed. Although the vulnerability does not directly affect system integrity or availability, the exposure of critical information can facilitate subsequent attacks such as privilege escalation or lateral movement within a network. Organizations relying on this electronic archives system, especially those handling sensitive or regulated data, face reputational damage, compliance violations, and operational risks. The availability of public exploit code increases the risk of opportunistic attacks, especially in environments with internet-facing instances of the affected software. The lack of vendor patching prolongs exposure and complicates remediation efforts.
Mitigation Recommendations
1. Immediately restrict external access to the /Search/Subject/downLoad endpoint via network controls such as firewalls or web application firewalls (WAFs) to limit exposure. 2. Implement input validation and sanitization at the application or proxy level to block path traversal patterns (e.g., '..', '%2e%2e', or other encoded traversal sequences) in the 'path' parameter. 3. Employ strict access controls and file system permissions on the server to ensure that the application process cannot access sensitive files outside its designated directories. 4. Monitor logs for suspicious requests targeting the vulnerable endpoint, especially those containing traversal sequences, and respond promptly to potential exploitation attempts. 5. If feasible, isolate the affected system in a segmented network zone to reduce the blast radius of a potential breach. 6. Engage with the vendor for updates or patches and track any future advisories. 7. Consider deploying runtime application self-protection (RASP) or intrusion detection systems (IDS) capable of detecting and blocking path traversal attacks. 8. As a longer-term measure, plan for an upgrade or replacement of the affected software with a version that addresses this vulnerability once available.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-18T09:24:14.020Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6996357e6aea4a407aec4455
Added to database: 2/18/2026, 9:56:14 PM
Last enriched: 2/28/2026, 1:38:44 PM
Last updated: 4/5/2026, 3:53:11 AM
Views: 91
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.