CVE-2026-28674: CWE-434: Unrestricted Upload of File with Dangerous Type in danvei233 xiaoheiFS
CVE-2026-28674 is a high-severity vulnerability in danvei233's xiaoheiFS versions prior to 0. 4. 0. It allows authenticated administrators to upload arbitrary files, including executables, to the plugins/payment/ directory via the AdminPaymentPluginUpload endpoint. The system uses a hardcoded password for authentication and does not validate file contents. A background watcher process scans this directory every 5 seconds and executes any newly uploaded executable files, enabling remote code execution (RCE). This flaw can lead to full system compromise, impacting confidentiality, integrity, and availability. The vulnerability is fixed in version 4. 0. 0.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2026-28674 affects xiaoheiFS, a self-hosted financial and operational system designed for cloud service businesses. In versions up to and including 0.3.15, the AdminPaymentPluginUpload endpoint allows administrators to upload files to the plugins/payment/ directory. Authentication relies solely on a hardcoded password ('qweasd123456'), which is a weak security practice (CWE-798). More critically, the system does not validate the type or content of uploaded files (CWE-434), permitting any file type, including malicious executables. A background watcher process named StartWatcher scans the plugins/payment/ directory every 5 seconds; if it detects a new executable file, it immediately executes it. This behavior results in remote code execution (RCE) with the privileges of the service, allowing attackers to run arbitrary code on the server. The vulnerability has a CVSS 3.1 base score of 7.2, reflecting high severity due to network attack vector, low attack complexity, required privileges (admin), no user interaction, and high impact on confidentiality, integrity, and availability. The issue is resolved in xiaoheiFS version 4.0.0, which presumably removes the hardcoded password and implements proper file validation and execution controls. No known exploits are currently reported in the wild, but the vulnerability poses a significant risk given the ease of exploitation by authenticated admins and the potential for complete system takeover.
Potential Impact
This vulnerability can have severe consequences for organizations using affected versions of xiaoheiFS. Successful exploitation allows an attacker with administrative credentials to execute arbitrary code on the server hosting the system, potentially leading to full system compromise. This can result in unauthorized access to sensitive financial and operational data, disruption of cloud service business operations, and the deployment of persistent malware or ransomware. The compromise of confidentiality, integrity, and availability can damage organizational reputation, cause financial losses, and lead to regulatory penalties, especially in industries with strict compliance requirements. Since xiaoheiFS is used in cloud service environments, exploitation could also impact multi-tenant infrastructures, increasing the scope of damage. The hardcoded password increases the risk of credential leakage or brute force discovery, further elevating the threat. Organizations that do not promptly patch or mitigate this vulnerability remain exposed to potentially devastating attacks.
Mitigation Recommendations
1. Immediate upgrade to xiaoheiFS version 4.0.0 or later, which addresses this vulnerability by removing the hardcoded password and implementing proper file validation and execution controls. 2. Until upgrade is possible, restrict administrative access to the AdminPaymentPluginUpload endpoint by network segmentation, IP whitelisting, or VPN access to minimize exposure. 3. Replace the hardcoded password with a strong, unique credential managed securely, and enforce multi-factor authentication for admin accounts. 4. Implement strict file type validation and sanitization on all upload endpoints to prevent dangerous file types from being accepted. 5. Disable or modify the StartWatcher background process to prevent automatic execution of uploaded files, or configure it to only execute signed or verified plugins. 6. Monitor logs and file system changes in the plugins/payment/ directory for suspicious activity. 7. Conduct regular security audits and penetration testing focused on upload functionalities and privilege management. 8. Educate administrators on secure password practices and the risks of using default or hardcoded credentials.
Affected Countries
United States, China, Germany, United Kingdom, Japan, South Korea, India, Canada, Australia, France
CVE-2026-28674: CWE-434: Unrestricted Upload of File with Dangerous Type in danvei233 xiaoheiFS
Description
CVE-2026-28674 is a high-severity vulnerability in danvei233's xiaoheiFS versions prior to 0. 4. 0. It allows authenticated administrators to upload arbitrary files, including executables, to the plugins/payment/ directory via the AdminPaymentPluginUpload endpoint. The system uses a hardcoded password for authentication and does not validate file contents. A background watcher process scans this directory every 5 seconds and executes any newly uploaded executable files, enabling remote code execution (RCE). This flaw can lead to full system compromise, impacting confidentiality, integrity, and availability. The vulnerability is fixed in version 4. 0. 0.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2026-28674 affects xiaoheiFS, a self-hosted financial and operational system designed for cloud service businesses. In versions up to and including 0.3.15, the AdminPaymentPluginUpload endpoint allows administrators to upload files to the plugins/payment/ directory. Authentication relies solely on a hardcoded password ('qweasd123456'), which is a weak security practice (CWE-798). More critically, the system does not validate the type or content of uploaded files (CWE-434), permitting any file type, including malicious executables. A background watcher process named StartWatcher scans the plugins/payment/ directory every 5 seconds; if it detects a new executable file, it immediately executes it. This behavior results in remote code execution (RCE) with the privileges of the service, allowing attackers to run arbitrary code on the server. The vulnerability has a CVSS 3.1 base score of 7.2, reflecting high severity due to network attack vector, low attack complexity, required privileges (admin), no user interaction, and high impact on confidentiality, integrity, and availability. The issue is resolved in xiaoheiFS version 4.0.0, which presumably removes the hardcoded password and implements proper file validation and execution controls. No known exploits are currently reported in the wild, but the vulnerability poses a significant risk given the ease of exploitation by authenticated admins and the potential for complete system takeover.
Potential Impact
This vulnerability can have severe consequences for organizations using affected versions of xiaoheiFS. Successful exploitation allows an attacker with administrative credentials to execute arbitrary code on the server hosting the system, potentially leading to full system compromise. This can result in unauthorized access to sensitive financial and operational data, disruption of cloud service business operations, and the deployment of persistent malware or ransomware. The compromise of confidentiality, integrity, and availability can damage organizational reputation, cause financial losses, and lead to regulatory penalties, especially in industries with strict compliance requirements. Since xiaoheiFS is used in cloud service environments, exploitation could also impact multi-tenant infrastructures, increasing the scope of damage. The hardcoded password increases the risk of credential leakage or brute force discovery, further elevating the threat. Organizations that do not promptly patch or mitigate this vulnerability remain exposed to potentially devastating attacks.
Mitigation Recommendations
1. Immediate upgrade to xiaoheiFS version 4.0.0 or later, which addresses this vulnerability by removing the hardcoded password and implementing proper file validation and execution controls. 2. Until upgrade is possible, restrict administrative access to the AdminPaymentPluginUpload endpoint by network segmentation, IP whitelisting, or VPN access to minimize exposure. 3. Replace the hardcoded password with a strong, unique credential managed securely, and enforce multi-factor authentication for admin accounts. 4. Implement strict file type validation and sanitization on all upload endpoints to prevent dangerous file types from being accepted. 5. Disable or modify the StartWatcher background process to prevent automatic execution of uploaded files, or configure it to only execute signed or verified plugins. 6. Monitor logs and file system changes in the plugins/payment/ directory for suspicious activity. 7. Conduct regular security audits and penetration testing focused on upload functionalities and privilege management. 8. Educate administrators on secure password practices and the risks of using default or hardcoded credentials.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-02T21:43:19.926Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69b9f8b0771bdb174900ac99
Added to database: 3/18/2026, 12:58:24 AM
Last enriched: 3/18/2026, 1:12:41 AM
Last updated: 3/18/2026, 6:46:52 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.