Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2672: Path Traversal in Tsinghua Unigroup Electronic Archives System

0
Medium
VulnerabilityCVE-2026-2672cvecve-2026-2672
Published: Wed Feb 18 2026 (02/18/2026, 21:32:07 UTC)
Source: CVE Database V5
Vendor/Project: Tsinghua Unigroup
Product: Electronic Archives System

Description

CVE-2026-2672 is a medium-severity path traversal vulnerability in Tsinghua Unigroup Electronic Archives System version 3. 2. 210802(62532). It affects the Download function at the /Search/Subject/downLoad endpoint, allowing remote attackers to manipulate the file path argument to access unauthorized files on the server. No authentication or user interaction is required, and the vulnerability can be exploited over the network. Although the vendor was notified, no patch or response has been provided, and a public exploit is available. The vulnerability has a CVSS 4. 0 base score of 5. 3, reflecting moderate impact and ease of exploitation. European organizations using this archival system could face unauthorized data disclosure risks.

AI-Powered Analysis

AILast updated: 02/18/2026, 22:10:32 UTC

Technical Analysis

CVE-2026-2672 is a path traversal vulnerability identified in Tsinghua Unigroup Electronic Archives System version 3.2.210802(62532). The flaw exists in the Download function accessed via the /Search/Subject/downLoad endpoint, where the 'path' argument is improperly sanitized. This allows an attacker to craft malicious requests that traverse directories beyond the intended file repository, potentially accessing sensitive files on the server's filesystem. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. The vendor was informed early but has not issued any patches or advisories. The vulnerability has a CVSS 4.0 score of 5.3, indicating medium severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The availability, integrity, and confidentiality impact is limited to confidentiality (low impact), as the attacker can read files but not modify or disrupt service. The public release of an exploit increases the likelihood of attacks. The lack of vendor response and patch availability means affected organizations must rely on mitigations and monitoring. This vulnerability is particularly concerning for organizations that store sensitive or regulated data in the affected archival system, as unauthorized file access could lead to data breaches or compliance violations.

Potential Impact

For European organizations using the Tsinghua Unigroup Electronic Archives System, this vulnerability poses a risk of unauthorized disclosure of sensitive archival data. Confidentiality is primarily impacted, as attackers can read arbitrary files on the server, potentially exposing personal data, intellectual property, or classified documents. This could lead to regulatory non-compliance under GDPR and other data protection laws, resulting in legal and financial penalties. The vulnerability does not directly affect system availability or integrity, but data exposure alone can have severe reputational and operational consequences. Since the exploit is remotely executable without authentication, attackers can target exposed systems over the internet or internal networks. Organizations in sectors such as government, research, finance, and healthcare that rely on electronic archives for critical records are especially vulnerable. The absence of a vendor patch increases the urgency for organizations to implement compensating controls to prevent exploitation and detect suspicious activity.

Mitigation Recommendations

1. Implement strict input validation and sanitization on the 'path' parameter in the Download function to prevent directory traversal sequences such as '../'. 2. Employ allowlisting of permissible file paths or filenames to restrict downloads to authorized files only. 3. Configure the web server and application to run with the least privileges necessary, limiting file system access to only required directories. 4. Use web application firewalls (WAFs) to detect and block path traversal attack patterns targeting the vulnerable endpoint. 5. Monitor logs for unusual access patterns or attempts to access sensitive files outside the intended directories. 6. Isolate the archival system within a segmented network zone to reduce exposure to external attackers. 7. If possible, disable or restrict the Download function until a vendor patch or official fix is available. 8. Engage with the vendor or community to track any updates or patches addressing this vulnerability. 9. Conduct regular security assessments and penetration tests focusing on file access controls in the archival system. 10. Educate IT and security teams about this vulnerability and the importance of rapid incident response if exploitation is detected.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-18T09:24:14.020Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6996357e6aea4a407aec4455

Added to database: 2/18/2026, 9:56:14 PM

Last enriched: 2/18/2026, 10:10:32 PM

Last updated: 2/18/2026, 11:21:36 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats