Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2684: Unrestricted Upload in Tsinghua Unigroup Electronic Archives System

0
Medium
VulnerabilityCVE-2026-2684cvecve-2026-2684
Published: Wed Feb 18 2026 (02/18/2026, 23:32:07 UTC)
Source: CVE Database V5
Vendor/Project: Tsinghua Unigroup
Product: Electronic Archives System

Description

A vulnerability was determined in Tsinghua Unigroup Electronic Archives System up to 3.2.210802(62532). The impacted element is an unknown function of the file /Archive/ErecordManage/uploadFile.html. Executing a manipulation of the argument File can lead to unrestricted upload. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 13:39:37 UTC

Technical Analysis

CVE-2026-2684 identifies a vulnerability in the Tsinghua Unigroup Electronic Archives System, specifically in the file upload functionality located at /Archive/ErecordManage/uploadFile.html. The flaw arises from insufficient validation or restrictions on the 'File' parameter, allowing an attacker to upload arbitrary files without authentication or user interaction. This unrestricted upload capability can be leveraged to place malicious files on the server, such as web shells or scripts, which may lead to remote code execution, data manipulation, or disruption of archival services. The vulnerability affects version 3.2.210802(62532) of the product. The attack vector is network-based with low attack complexity and no privileges required, making it accessible to remote attackers. The CVSS 4.0 vector indicates partial impact on confidentiality, integrity, and availability, reflecting the potential for data exposure and system compromise. Despite early vendor notification, no patch or mitigation guidance has been provided, increasing the urgency for organizations to apply compensating controls. No public exploits have been observed yet, but the public disclosure increases the risk of exploitation attempts. The vulnerability highlights a critical security gap in file upload handling within the electronic archives system, a core component for managing sensitive organizational records.

Potential Impact

The unrestricted file upload vulnerability can have severe consequences for organizations relying on the Tsinghua Unigroup Electronic Archives System. Attackers could upload malicious payloads, such as web shells, enabling persistent remote access and control over the affected servers. This can lead to unauthorized data access, modification, or deletion, compromising the confidentiality and integrity of sensitive archived documents. Additionally, attackers might disrupt availability by uploading files that cause service crashes or resource exhaustion. The breach of archival systems could undermine regulatory compliance, damage organizational reputation, and result in financial losses. Given the system's role in managing electronic archives, the impact extends to any business or government entity that depends on secure document storage and retrieval. The lack of vendor response and patch availability increases the risk exposure, especially in environments where this product is widely deployed. The vulnerability's ease of exploitation and remote attack vector make it a significant threat to global organizations using this software.

Mitigation Recommendations

1. Immediately restrict access to the /Archive/ErecordManage/uploadFile.html endpoint using network-level controls such as firewalls or VPNs to limit exposure to trusted users only. 2. Implement web application firewall (WAF) rules to detect and block suspicious file upload attempts, particularly those containing executable or script files. 3. Enforce strict server-side validation of uploaded files, including file type, size, and content inspection, to prevent malicious payloads. 4. Isolate the file upload directory with minimal permissions and disable execution rights to prevent uploaded files from being executed as code. 5. Monitor server logs and file system changes for unusual activity indicative of exploitation attempts. 6. If possible, deploy intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation patterns related to this vulnerability. 7. Engage with Tsinghua Unigroup support channels to request official patches or guidance and track for future updates. 8. Consider temporary migration to alternative archival solutions if risk tolerance is low and mitigation controls cannot be fully implemented. 9. Conduct security awareness training for administrators to recognize and respond to potential exploitation signs. 10. Regularly back up archival data and verify backup integrity to enable recovery in case of compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-18T13:36:36.099Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6996519e6aea4a407af2b707

Added to database: 2/18/2026, 11:56:14 PM

Last enriched: 2/28/2026, 1:39:37 PM

Last updated: 4/3/2026, 6:01:11 PM

Views: 106

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses