CVE-2026-2954: Injection in Dromara UJCMS
A vulnerability was found in Dromara UJCMS 10.0.2. Impacted is the function importChanel of the file /api/backend/ext/import-data/import-channel of the component ImportDataController. Performing a manipulation of the argument driverClassName/url results in injection. It is possible to initiate the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2026-2954 identifies an injection vulnerability in Dromara UJCMS version 10.0.2, located in the importChanel function within the /api/backend/ext/import-data/import-channel endpoint of the ImportDataController component. The vulnerability is triggered by manipulation of the driverClassName and url parameters, which are not properly sanitized or validated, enabling injection attacks. This flaw allows remote attackers to execute arbitrary code or commands by crafting malicious input, potentially leading to unauthorized access or data manipulation. The attack vector requires no authentication or user interaction, increasing the risk of exploitation. The vulnerability has a CVSS 4.0 base score of 5.3, reflecting a medium severity level due to limited scope and partial impact on confidentiality, integrity, and availability. Despite public disclosure and availability of exploit code, no active exploitation has been observed. The vendor was notified but has not issued any response or patch, leaving systems exposed. This vulnerability affects only version 10.0.2 of UJCMS, a content management system used primarily in certain regions and sectors. The lack of vendor response and patch availability necessitates immediate defensive measures by users to mitigate risk.
Potential Impact
The injection vulnerability in UJCMS 10.0.2 can lead to unauthorized code execution, data manipulation, or system compromise, impacting confidentiality, integrity, and availability of affected systems. Attackers exploiting this flaw could gain control over the CMS backend, potentially leading to data breaches, defacement, or disruption of services. Organizations relying on UJCMS for content management, especially those handling sensitive or critical information, face increased risk of operational disruption and reputational damage. The remote, unauthenticated nature of the attack vector broadens the potential attacker base, including opportunistic threat actors. The absence of vendor patches prolongs exposure, increasing the window for exploitation. However, the medium CVSS score and limited scope suggest that while impactful, the vulnerability is not trivially exploitable at scale without additional conditions. Nonetheless, targeted attacks against high-value organizations using this CMS could have significant consequences.
Mitigation Recommendations
Given the lack of official patches, organizations should implement immediate compensating controls. These include restricting access to the vulnerable import-channel API endpoint via network segmentation or firewall rules to trusted IPs only. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting driverClassName and url parameters. Conduct thorough input validation and sanitization on all user-supplied data where possible, potentially via custom middleware or reverse proxies. Monitor logs for anomalous activity related to import data functions and unusual parameter values. Consider disabling or restricting the importChanel functionality if not essential. Maintain up-to-date backups to enable recovery in case of compromise. Engage with the vendor or community for updates and patches, and plan for an upgrade once a fixed version is released. Additionally, conduct security awareness training for administrators to recognize signs of exploitation.
Affected Countries
China, United States, Germany, South Korea, Japan, India, Brazil, Russia, France, United Kingdom
CVE-2026-2954: Injection in Dromara UJCMS
Description
A vulnerability was found in Dromara UJCMS 10.0.2. Impacted is the function importChanel of the file /api/backend/ext/import-data/import-channel of the component ImportDataController. Performing a manipulation of the argument driverClassName/url results in injection. It is possible to initiate the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-2954 identifies an injection vulnerability in Dromara UJCMS version 10.0.2, located in the importChanel function within the /api/backend/ext/import-data/import-channel endpoint of the ImportDataController component. The vulnerability is triggered by manipulation of the driverClassName and url parameters, which are not properly sanitized or validated, enabling injection attacks. This flaw allows remote attackers to execute arbitrary code or commands by crafting malicious input, potentially leading to unauthorized access or data manipulation. The attack vector requires no authentication or user interaction, increasing the risk of exploitation. The vulnerability has a CVSS 4.0 base score of 5.3, reflecting a medium severity level due to limited scope and partial impact on confidentiality, integrity, and availability. Despite public disclosure and availability of exploit code, no active exploitation has been observed. The vendor was notified but has not issued any response or patch, leaving systems exposed. This vulnerability affects only version 10.0.2 of UJCMS, a content management system used primarily in certain regions and sectors. The lack of vendor response and patch availability necessitates immediate defensive measures by users to mitigate risk.
Potential Impact
The injection vulnerability in UJCMS 10.0.2 can lead to unauthorized code execution, data manipulation, or system compromise, impacting confidentiality, integrity, and availability of affected systems. Attackers exploiting this flaw could gain control over the CMS backend, potentially leading to data breaches, defacement, or disruption of services. Organizations relying on UJCMS for content management, especially those handling sensitive or critical information, face increased risk of operational disruption and reputational damage. The remote, unauthenticated nature of the attack vector broadens the potential attacker base, including opportunistic threat actors. The absence of vendor patches prolongs exposure, increasing the window for exploitation. However, the medium CVSS score and limited scope suggest that while impactful, the vulnerability is not trivially exploitable at scale without additional conditions. Nonetheless, targeted attacks against high-value organizations using this CMS could have significant consequences.
Mitigation Recommendations
Given the lack of official patches, organizations should implement immediate compensating controls. These include restricting access to the vulnerable import-channel API endpoint via network segmentation or firewall rules to trusted IPs only. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting driverClassName and url parameters. Conduct thorough input validation and sanitization on all user-supplied data where possible, potentially via custom middleware or reverse proxies. Monitor logs for anomalous activity related to import data functions and unusual parameter values. Consider disabling or restricting the importChanel functionality if not essential. Maintain up-to-date backups to enable recovery in case of compromise. Engage with the vendor or community for updates and patches, and plan for an upgrade once a fixed version is released. Additionally, conduct security awareness training for administrators to recognize signs of exploitation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-21T21:11:15.185Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699b1df9be58cf853b5c408f
Added to database: 2/22/2026, 3:17:13 PM
Last enriched: 3/2/2026, 6:32:36 AM
Last updated: 4/8/2026, 9:51:37 PM
Views: 80
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.