Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27895: CWE-185: Incorrect Regular Expression in LDAPAccountManager lam

0
Medium
VulnerabilityCVE-2026-27895cvecve-2026-27895cwe-185
Published: Tue Mar 17 2026 (03/17/2026, 23:51:26 UTC)
Source: CVE Database V5
Vendor/Project: LDAPAccountManager
Product: lam

Description

CVE-2026-27895 is a medium severity vulnerability in LDAP Account Manager (LAM) versions prior to 9. 5, where the PDF export component improperly validates uploaded file extensions. This flaw allows attackers with limited privileges to upload arbitrary file types, including executable PHP files, potentially leading to remote code execution as the web server user. The vulnerability arises from an incorrect regular expression validation (CWE-185) that fails to restrict file uploads properly. Although no known exploits are currently in the wild, successful exploitation could compromise the integrity of affected systems. The issue is fixed in LAM version 9. 5, and a recommended workaround is to make the configuration directory read-only for the web server user. Organizations using LAM for LDAP management should prioritize upgrading or applying mitigations to prevent exploitation.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/25/2026, 01:02:52 UTC

Technical Analysis

LDAP Account Manager (LAM) is a web-based interface used to manage LDAP directory entries such as users, groups, and DHCP settings. In versions prior to 9.5, the PDF export functionality contains a vulnerability due to an incorrect regular expression used to validate uploaded file extensions. This flaw (CWE-185) allows an attacker with limited privileges (requiring some level of authentication) to upload files of any type, including potentially malicious PHP scripts. Because the uploaded files can be executed by the web server, this can lead to remote code execution (RCE) under the web server's user context. The vulnerability is tracked as CVE-2026-27895 with a CVSS 3.1 base score of 4.3 (medium severity), reflecting the need for authentication and the limited scope of impact (no confidentiality or availability impact directly). The vulnerability does not require user interaction beyond authentication and can be mitigated by upgrading to version 9.5 where the validation is corrected. Alternatively, restricting write permissions on the /var/lib/ldap-account-manager/config directory for the web server user can prevent malicious file uploads from being saved or executed. No public exploits have been reported yet, but the potential for RCE makes this a significant risk for organizations relying on LAM for LDAP management.

Potential Impact

If exploited, this vulnerability allows an authenticated attacker to upload arbitrary files, including executable scripts, to the LAM server. This can lead to remote code execution with the privileges of the web server user, potentially allowing attackers to manipulate LDAP data, escalate privileges, or pivot within the network. While the confidentiality impact is minimal since the vulnerability does not directly expose data, the integrity of LDAP entries and the availability of the service could be compromised through malicious code execution. Organizations using LAM in critical infrastructure or identity management roles could face significant operational disruptions and security breaches. The medium CVSS score reflects the need for authentication and the limited scope of impact, but the risk remains notable due to the potential for lateral movement and further exploitation post-compromise.

Mitigation Recommendations

1. Upgrade LDAP Account Manager to version 9.5 or later, where the file extension validation issue is fixed. 2. As an immediate workaround, change the permissions of /var/lib/ldap-account-manager/config to be read-only for the web server user to prevent unauthorized file uploads. 3. Implement strict access controls and monitoring on the LAM server, including limiting user accounts that can upload files. 4. Employ web application firewalls (WAFs) to detect and block suspicious file upload attempts targeting the PDF export functionality. 5. Regularly audit uploaded files and server directories for unauthorized or unexpected files. 6. Monitor logs for unusual activity related to file uploads and execution attempts. 7. Consider isolating the LAM server in a segmented network zone to limit potential lateral movement if compromised.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-24T15:19:29.717Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b9ee21771bdb1749ef1e0e

Added to database: 3/18/2026, 12:13:21 AM

Last enriched: 3/25/2026, 1:02:52 AM

Last updated: 4/28/2026, 10:03:55 PM

Views: 73

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses