CVE-2026-2953: Path Traversal in Dromara UJCMS
A vulnerability has been found in Dromara UJCMS 101.2. This issue affects the function deleteDirectory of the file WebFileTemplateController.delete of the component Template Handler. Such manipulation leads to path traversal. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2026-2953 is a path traversal vulnerability identified in Dromara UJCMS version 101.2, affecting the deleteDirectory function within the WebFileTemplateController.delete component of the Template Handler module. The vulnerability arises due to insufficient validation of user-supplied input in the file path parameter, allowing an attacker to traverse directories and delete files or directories outside the intended directory scope. This can lead to unauthorized deletion of critical files, impacting system integrity and availability. The attack can be performed remotely without user interaction and requires low privileges, making exploitation relatively straightforward. The vendor was informed early but has not responded or released a patch, and exploit details have been publicly disclosed, increasing the risk of exploitation. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and partial impact on integrity and availability (VI:L, VA:L). No known exploits are currently active in the wild, but the public disclosure raises the likelihood of future attacks. The vulnerability does not affect confidentiality directly but poses a significant risk to system stability and data integrity. Organizations relying on UJCMS 101.2 should assess exposure and implement compensating controls until a patch is available.
Potential Impact
The primary impact of CVE-2026-2953 is unauthorized deletion of files or directories on systems running Dromara UJCMS 101.2, which can disrupt web services, cause data loss, and degrade system availability. Attackers exploiting this vulnerability can manipulate file paths to delete critical application or system files, potentially leading to denial of service or forcing costly recovery efforts. Although confidentiality is not directly compromised, the integrity and availability of affected systems are at risk. Organizations with public-facing UJCMS installations are particularly vulnerable to remote attacks without user interaction. The lack of vendor response and patch increases the window of exposure, raising the risk of exploitation by opportunistic attackers or automated scanning tools. This can result in operational downtime, reputational damage, and financial losses, especially for businesses relying heavily on UJCMS for content management and web operations.
Mitigation Recommendations
1. Immediately restrict access to the deleteDirectory function by implementing strict access controls, limiting it to trusted administrators only. 2. Employ web application firewalls (WAFs) with custom rules to detect and block path traversal patterns in HTTP requests targeting the vulnerable endpoint. 3. Monitor server logs and application activity for unusual deletion requests or anomalies related to file operations. 4. If feasible, disable or remove the vulnerable Template Handler component until a patch is available. 5. Implement input validation and sanitization at the application level to reject suspicious path inputs, such as those containing '../' sequences. 6. Maintain regular backups of critical data and configuration files to enable rapid recovery in case of successful exploitation. 7. Engage with the vendor or community to track patch releases or security advisories and apply updates promptly once available. 8. Consider isolating UJCMS installations in segmented network zones to reduce exposure to external threats. 9. Conduct penetration testing and vulnerability scanning focused on path traversal to identify and remediate similar issues proactively.
Affected Countries
China, United States, Germany, India, Brazil, Russia, South Korea, Japan, United Kingdom, France
CVE-2026-2953: Path Traversal in Dromara UJCMS
Description
A vulnerability has been found in Dromara UJCMS 101.2. This issue affects the function deleteDirectory of the file WebFileTemplateController.delete of the component Template Handler. Such manipulation leads to path traversal. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-2953 is a path traversal vulnerability identified in Dromara UJCMS version 101.2, affecting the deleteDirectory function within the WebFileTemplateController.delete component of the Template Handler module. The vulnerability arises due to insufficient validation of user-supplied input in the file path parameter, allowing an attacker to traverse directories and delete files or directories outside the intended directory scope. This can lead to unauthorized deletion of critical files, impacting system integrity and availability. The attack can be performed remotely without user interaction and requires low privileges, making exploitation relatively straightforward. The vendor was informed early but has not responded or released a patch, and exploit details have been publicly disclosed, increasing the risk of exploitation. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and partial impact on integrity and availability (VI:L, VA:L). No known exploits are currently active in the wild, but the public disclosure raises the likelihood of future attacks. The vulnerability does not affect confidentiality directly but poses a significant risk to system stability and data integrity. Organizations relying on UJCMS 101.2 should assess exposure and implement compensating controls until a patch is available.
Potential Impact
The primary impact of CVE-2026-2953 is unauthorized deletion of files or directories on systems running Dromara UJCMS 101.2, which can disrupt web services, cause data loss, and degrade system availability. Attackers exploiting this vulnerability can manipulate file paths to delete critical application or system files, potentially leading to denial of service or forcing costly recovery efforts. Although confidentiality is not directly compromised, the integrity and availability of affected systems are at risk. Organizations with public-facing UJCMS installations are particularly vulnerable to remote attacks without user interaction. The lack of vendor response and patch increases the window of exposure, raising the risk of exploitation by opportunistic attackers or automated scanning tools. This can result in operational downtime, reputational damage, and financial losses, especially for businesses relying heavily on UJCMS for content management and web operations.
Mitigation Recommendations
1. Immediately restrict access to the deleteDirectory function by implementing strict access controls, limiting it to trusted administrators only. 2. Employ web application firewalls (WAFs) with custom rules to detect and block path traversal patterns in HTTP requests targeting the vulnerable endpoint. 3. Monitor server logs and application activity for unusual deletion requests or anomalies related to file operations. 4. If feasible, disable or remove the vulnerable Template Handler component until a patch is available. 5. Implement input validation and sanitization at the application level to reject suspicious path inputs, such as those containing '../' sequences. 6. Maintain regular backups of critical data and configuration files to enable rapid recovery in case of successful exploitation. 7. Engage with the vendor or community to track patch releases or security advisories and apply updates promptly once available. 8. Consider isolating UJCMS installations in segmented network zones to reduce exposure to external threats. 9. Conduct penetration testing and vulnerability scanning focused on path traversal to identify and remediate similar issues proactively.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-21T21:11:08.662Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699b0fe9be58cf853b4f96d8
Added to database: 2/22/2026, 2:17:13 PM
Last enriched: 3/2/2026, 6:10:00 AM
Last updated: 4/8/2026, 7:55:47 PM
Views: 69
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.