CVE-2026-2977: Unrestricted Upload in FastApiAdmin
CVE-2026-2977 is a medium severity vulnerability in FastApiAdmin versions up to 2. 2. 0 that allows unrestricted file uploads via the upload_controller function in the Scheduled Task API. This flaw enables remote attackers to upload arbitrary files without authentication or user interaction, potentially leading to limited confidentiality, integrity, and availability impacts. The vulnerability has a CVSS 4. 0 score of 5. 3, reflecting its moderate risk. Although no public exploits are currently observed in the wild, the vulnerability is publicly disclosed and could be leveraged for malicious purposes. Organizations using affected FastApiAdmin versions should prioritize patching or apply mitigations to restrict upload capabilities. Countries with significant use of FastApiAdmin or strategic reliance on web applications built with it are at higher risk.
AI Analysis
Technical Summary
CVE-2026-2977 is a security vulnerability identified in FastApiAdmin, an administrative interface framework for FastAPI applications, affecting versions 2.0, 2.1, and 2.2.0. The vulnerability resides in the upload_controller function within the Scheduled Task API component, specifically in the file /backend/app/api/v1/module_common/file/controller.py. Due to insufficient validation or restrictions on file uploads, an attacker can remotely upload arbitrary files without requiring authentication or user interaction. This unrestricted upload capability can be exploited to place malicious files on the server, potentially leading to further attacks such as remote code execution, data tampering, or denial of service, depending on how the uploaded files are processed or accessed. The CVSS 4.0 base score is 5.3, indicating a medium severity level, with attack vector being network-based, low attack complexity, no privileges or user interaction required, and limited impacts on confidentiality, integrity, and availability. Although no known exploits are currently active in the wild, the public disclosure increases the risk of exploitation attempts. The vulnerability highlights the need for strict input validation, access controls, and secure handling of file uploads in web applications using FastApiAdmin.
Potential Impact
The unrestricted upload vulnerability in FastApiAdmin can have several impacts on organizations worldwide. Attackers could upload malicious files such as web shells, scripts, or malware, potentially leading to unauthorized access, data breaches, or system compromise. Even though the CVSS score indicates medium severity with limited confidentiality, integrity, and availability impacts, the actual impact depends on the deployment context and how uploaded files are handled. For example, if uploaded files are executed or accessible via the web server, attackers could achieve remote code execution or pivot within the network. This could disrupt business operations, lead to data loss or theft, and damage organizational reputation. Organizations relying on FastApiAdmin for administrative interfaces or scheduled task management are particularly at risk. The vulnerability's remote exploitability without authentication increases the attack surface, making it attractive for opportunistic attackers and automated scanning tools. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially after public disclosure.
Mitigation Recommendations
To mitigate CVE-2026-2977, organizations should first upgrade FastApiAdmin to a version where this vulnerability is patched once available. In the absence of an official patch, implement strict validation on uploaded files, including checking file types, sizes, and content signatures to prevent malicious uploads. Restrict upload functionality to authenticated and authorized users only, applying role-based access controls. Employ network-level protections such as web application firewalls (WAFs) to detect and block suspicious upload attempts. Monitor logs for unusual upload activity and conduct regular security audits of the upload handling code. Isolate the upload directory from execution contexts by configuring the web server to disallow execution of uploaded files. Additionally, consider implementing content security policies and sandboxing techniques to limit the impact of any successful upload. Educate developers and administrators about secure file upload practices and the risks associated with unrestricted uploads. Finally, maintain an incident response plan to quickly address any exploitation attempts.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, Netherlands, Japan, South Korea, India
CVE-2026-2977: Unrestricted Upload in FastApiAdmin
Description
CVE-2026-2977 is a medium severity vulnerability in FastApiAdmin versions up to 2. 2. 0 that allows unrestricted file uploads via the upload_controller function in the Scheduled Task API. This flaw enables remote attackers to upload arbitrary files without authentication or user interaction, potentially leading to limited confidentiality, integrity, and availability impacts. The vulnerability has a CVSS 4. 0 score of 5. 3, reflecting its moderate risk. Although no public exploits are currently observed in the wild, the vulnerability is publicly disclosed and could be leveraged for malicious purposes. Organizations using affected FastApiAdmin versions should prioritize patching or apply mitigations to restrict upload capabilities. Countries with significant use of FastApiAdmin or strategic reliance on web applications built with it are at higher risk.
AI-Powered Analysis
Technical Analysis
CVE-2026-2977 is a security vulnerability identified in FastApiAdmin, an administrative interface framework for FastAPI applications, affecting versions 2.0, 2.1, and 2.2.0. The vulnerability resides in the upload_controller function within the Scheduled Task API component, specifically in the file /backend/app/api/v1/module_common/file/controller.py. Due to insufficient validation or restrictions on file uploads, an attacker can remotely upload arbitrary files without requiring authentication or user interaction. This unrestricted upload capability can be exploited to place malicious files on the server, potentially leading to further attacks such as remote code execution, data tampering, or denial of service, depending on how the uploaded files are processed or accessed. The CVSS 4.0 base score is 5.3, indicating a medium severity level, with attack vector being network-based, low attack complexity, no privileges or user interaction required, and limited impacts on confidentiality, integrity, and availability. Although no known exploits are currently active in the wild, the public disclosure increases the risk of exploitation attempts. The vulnerability highlights the need for strict input validation, access controls, and secure handling of file uploads in web applications using FastApiAdmin.
Potential Impact
The unrestricted upload vulnerability in FastApiAdmin can have several impacts on organizations worldwide. Attackers could upload malicious files such as web shells, scripts, or malware, potentially leading to unauthorized access, data breaches, or system compromise. Even though the CVSS score indicates medium severity with limited confidentiality, integrity, and availability impacts, the actual impact depends on the deployment context and how uploaded files are handled. For example, if uploaded files are executed or accessible via the web server, attackers could achieve remote code execution or pivot within the network. This could disrupt business operations, lead to data loss or theft, and damage organizational reputation. Organizations relying on FastApiAdmin for administrative interfaces or scheduled task management are particularly at risk. The vulnerability's remote exploitability without authentication increases the attack surface, making it attractive for opportunistic attackers and automated scanning tools. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially after public disclosure.
Mitigation Recommendations
To mitigate CVE-2026-2977, organizations should first upgrade FastApiAdmin to a version where this vulnerability is patched once available. In the absence of an official patch, implement strict validation on uploaded files, including checking file types, sizes, and content signatures to prevent malicious uploads. Restrict upload functionality to authenticated and authorized users only, applying role-based access controls. Employ network-level protections such as web application firewalls (WAFs) to detect and block suspicious upload attempts. Monitor logs for unusual upload activity and conduct regular security audits of the upload handling code. Isolate the upload directory from execution contexts by configuring the web server to disallow execution of uploaded files. Additionally, consider implementing content security policies and sandboxing techniques to limit the impact of any successful upload. Educate developers and administrators about secure file upload practices and the risks associated with unrestricted uploads. Finally, maintain an incident response plan to quickly address any exploitation attempts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-22T15:09:07.919Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699c027dbe58cf853b5217e9
Added to database: 2/23/2026, 7:32:13 AM
Last enriched: 2/23/2026, 7:46:44 AM
Last updated: 2/23/2026, 8:52:50 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2980: Buffer Overflow in UTT HiPER 810G
HighCVE-2026-2979: Unrestricted Upload in FastApiAdmin
MediumCVE-2026-26365: CWE-444 Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') in Akamai Ghost
MediumCVE-2026-2978: Unrestricted Upload in FastApiAdmin
MediumCVE-2026-1367: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Zohocorp ManageEngine ADSelfService Plus
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.