Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27895: CWE-185: Incorrect Regular Expression in LDAPAccountManager lam

0
Medium
VulnerabilityCVE-2026-27895cvecve-2026-27895cwe-185
Published: Tue Mar 17 2026 (03/17/2026, 23:51:26 UTC)
Source: CVE Database V5
Vendor/Project: LDAPAccountManager
Product: lam

Description

CVE-2026-27895 is a medium severity vulnerability in LDAP Account Manager (LAM) versions prior to 9. 5. The issue arises from improper validation of uploaded file extensions in the PDF export component, allowing attackers to upload arbitrary file types, including executable PHP files. Exploiting this flaw can lead to remote code execution with the privileges of the web server user. No user interaction is required, but the attacker must have low-level privileges (authenticated). The vulnerability is fixed in version 9. 5. As a temporary mitigation, making the /var/lib/ldap-account-manager/config directory read-only for the web server user can reduce risk. Organizations using LAM for LDAP management should prioritize upgrading or applying mitigations to prevent potential compromise.

AI-Powered Analysis

AILast updated: 03/18/2026, 00:28:01 UTC

Technical Analysis

LDAP Account Manager (LAM) is a web-based interface used to manage LDAP directory entries such as users, groups, and DHCP settings. In versions prior to 9.5, the PDF export component contains a vulnerability (CVE-2026-27895) due to incorrect regular expression validation of uploaded file extensions (CWE-185). This flaw allows an attacker with at least low-level authenticated access to upload files of any type, including malicious PHP scripts, bypassing intended file type restrictions. Once uploaded, these files can be executed by the web server, resulting in remote code execution (RCE) under the web server's user context. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network. The issue was publicly disclosed in March 2026, with no known active exploits in the wild at the time of publication. The vendor addressed the vulnerability in LAM version 9.5 by properly validating file uploads. A recommended workaround before upgrading is to restrict write permissions on the /var/lib/ldap-account-manager/config directory to prevent unauthorized file uploads by the web server process.

Potential Impact

Successful exploitation of this vulnerability can lead to remote code execution on the server hosting LDAP Account Manager, compromising the confidentiality and integrity of the system and potentially the broader network. Attackers could execute arbitrary commands, modify LDAP data, or pivot to other internal systems. Although the web server user privileges may be limited, attackers can leverage this foothold for further privilege escalation or lateral movement. Organizations relying on LAM for critical LDAP management risk disruption of directory services, unauthorized data access, and potential exposure of sensitive user and group information. The vulnerability's medium CVSS score reflects the need for authentication and limited impact on confidentiality but highlights the serious risk posed by remote code execution capabilities.

Mitigation Recommendations

The primary mitigation is to upgrade LDAP Account Manager to version 9.5 or later, where the vulnerability is fixed. Until an upgrade is possible, administrators should implement the workaround by making the /var/lib/ldap-account-manager/config directory read-only for the web server user to prevent unauthorized file uploads. Additionally, organizations should restrict access to the LAM interface to trusted networks and authenticated users only, minimizing exposure. Employing web application firewalls (WAFs) to detect and block suspicious file upload attempts can provide an additional layer of defense. Regularly auditing uploaded files and monitoring web server logs for anomalous activity can help detect exploitation attempts early. Finally, applying the principle of least privilege to the web server user and isolating the LAM application environment can limit the impact of a successful attack.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-24T15:19:29.717Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b9ee21771bdb1749ef1e0e

Added to database: 3/18/2026, 12:13:21 AM

Last enriched: 3/18/2026, 12:28:01 AM

Last updated: 3/18/2026, 7:31:48 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses