Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2954: Injection in Dromara UJCMS

0
Medium
VulnerabilityCVE-2026-2954cvecve-2026-2954
Published: Sun Feb 22 2026 (02/22/2026, 15:02:17 UTC)
Source: CVE Database V5
Vendor/Project: Dromara
Product: UJCMS

Description

A vulnerability was found in Dromara UJCMS 10.0.2. Impacted is the function importChanel of the file /api/backend/ext/import-data/import-channel of the component ImportDataController. Performing a manipulation of the argument driverClassName/url results in injection. It is possible to initiate the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/02/2026, 06:32:36 UTC

Technical Analysis

CVE-2026-2954 identifies an injection vulnerability in Dromara UJCMS version 10.0.2, located in the importChanel function within the /api/backend/ext/import-data/import-channel endpoint of the ImportDataController component. The vulnerability is triggered by manipulation of the driverClassName and url parameters, which are not properly sanitized or validated, enabling injection attacks. This flaw allows remote attackers to execute arbitrary code or commands by crafting malicious input, potentially leading to unauthorized access or data manipulation. The attack vector requires no authentication or user interaction, increasing the risk of exploitation. The vulnerability has a CVSS 4.0 base score of 5.3, reflecting a medium severity level due to limited scope and partial impact on confidentiality, integrity, and availability. Despite public disclosure and availability of exploit code, no active exploitation has been observed. The vendor was notified but has not issued any response or patch, leaving systems exposed. This vulnerability affects only version 10.0.2 of UJCMS, a content management system used primarily in certain regions and sectors. The lack of vendor response and patch availability necessitates immediate defensive measures by users to mitigate risk.

Potential Impact

The injection vulnerability in UJCMS 10.0.2 can lead to unauthorized code execution, data manipulation, or system compromise, impacting confidentiality, integrity, and availability of affected systems. Attackers exploiting this flaw could gain control over the CMS backend, potentially leading to data breaches, defacement, or disruption of services. Organizations relying on UJCMS for content management, especially those handling sensitive or critical information, face increased risk of operational disruption and reputational damage. The remote, unauthenticated nature of the attack vector broadens the potential attacker base, including opportunistic threat actors. The absence of vendor patches prolongs exposure, increasing the window for exploitation. However, the medium CVSS score and limited scope suggest that while impactful, the vulnerability is not trivially exploitable at scale without additional conditions. Nonetheless, targeted attacks against high-value organizations using this CMS could have significant consequences.

Mitigation Recommendations

Given the lack of official patches, organizations should implement immediate compensating controls. These include restricting access to the vulnerable import-channel API endpoint via network segmentation or firewall rules to trusted IPs only. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting driverClassName and url parameters. Conduct thorough input validation and sanitization on all user-supplied data where possible, potentially via custom middleware or reverse proxies. Monitor logs for anomalous activity related to import data functions and unusual parameter values. Consider disabling or restricting the importChanel functionality if not essential. Maintain up-to-date backups to enable recovery in case of compromise. Engage with the vendor or community for updates and patches, and plan for an upgrade once a fixed version is released. Additionally, conduct security awareness training for administrators to recognize signs of exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-21T21:11:15.185Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699b1df9be58cf853b5c408f

Added to database: 2/22/2026, 3:17:13 PM

Last enriched: 3/2/2026, 6:32:36 AM

Last updated: 4/8/2026, 9:51:37 PM

Views: 80

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses