CVE-2026-2979: Unrestricted Upload in FastApiAdmin
CVE-2026-2979 is a medium severity vulnerability in FastApiAdmin versions up to 2. 2. 0, specifically in the user_avatar_upload_controller function. It allows remote attackers to perform unrestricted file uploads without authentication or user interaction. This flaw could enable attackers to upload malicious files, potentially leading to code execution or system compromise. The vulnerability affects the Scheduled Task API component and does not require user interaction or elevated privileges beyond low-level privileges. Although no known exploits are currently observed in the wild, a public exploit has been published. Organizations using FastApiAdmin for administrative interfaces or user management should prioritize patching or mitigating this issue. The vulnerability has a CVSS 4. 0 score of 5.
AI Analysis
Technical Summary
CVE-2026-2979 is a security vulnerability identified in FastApiAdmin, an administrative interface framework for FastAPI applications, affecting versions 2.0 through 2.2.0. The flaw resides in the user_avatar_upload_controller function within the Scheduled Task API component, located in the /backend/app/api/v1/module_system/user/controller.py file. This vulnerability allows an attacker to perform unrestricted file uploads remotely without requiring user interaction or elevated privileges beyond low-level access. The unrestricted upload means that the application does not properly validate or restrict the types, sizes, or contents of files uploaded via the avatar upload endpoint. Consequently, an attacker could upload malicious files such as web shells, scripts, or executables, potentially leading to remote code execution, privilege escalation, or persistent backdoors within the affected system. The vulnerability has been assigned a CVSS 4.0 base score of 5.3, indicating a medium severity level. The vector metrics indicate network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no confirmed exploits have been observed in the wild, a public exploit is available, increasing the risk of exploitation. The vulnerability affects organizations using FastApiAdmin for managing user avatars or administrative tasks, especially those exposing the API endpoint to untrusted networks. The lack of proper validation and access control in the upload function is the root cause, making it critical to implement strict file validation and access restrictions.
Potential Impact
The unrestricted file upload vulnerability in FastApiAdmin can have significant impacts on organizations worldwide. Attackers exploiting this flaw can upload malicious files that may lead to remote code execution, allowing full system compromise. This can result in data breaches, unauthorized access to sensitive information, disruption of services, and potential lateral movement within the network. The vulnerability's ease of exploitation and remote attack vector increase the risk of widespread attacks, especially in environments where FastApiAdmin is exposed to the internet or untrusted networks. Organizations relying on FastApiAdmin for administrative interfaces or user management may face reputational damage, regulatory penalties, and operational downtime if exploited. The medium severity score reflects moderate impact, but the potential for escalation to critical outcomes exists if combined with other vulnerabilities or misconfigurations. The absence of authentication or user interaction requirements lowers the barrier for attackers, making it a viable target for automated attacks or exploitation by less skilled adversaries.
Mitigation Recommendations
To mitigate CVE-2026-2979, organizations should immediately upgrade FastApiAdmin to a version where this vulnerability is patched once available. In the absence of an official patch, implement strict server-side validation of uploaded files, including checking file types, extensions, MIME types, and scanning for malicious content. Restrict upload permissions to authenticated and authorized users only, enforcing role-based access controls. Employ network-level protections such as web application firewalls (WAFs) to detect and block suspicious upload attempts. Isolate the upload directory from executable permissions to prevent execution of uploaded files. Monitor logs for unusual upload activity and conduct regular security audits of the affected API endpoints. Additionally, consider implementing content security policies and endpoint rate limiting to reduce attack surface. Educate developers and administrators about secure file handling practices and ensure secure coding standards are followed in future development. Finally, maintain an incident response plan to quickly address any exploitation attempts.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, Japan, South Korea, India
CVE-2026-2979: Unrestricted Upload in FastApiAdmin
Description
CVE-2026-2979 is a medium severity vulnerability in FastApiAdmin versions up to 2. 2. 0, specifically in the user_avatar_upload_controller function. It allows remote attackers to perform unrestricted file uploads without authentication or user interaction. This flaw could enable attackers to upload malicious files, potentially leading to code execution or system compromise. The vulnerability affects the Scheduled Task API component and does not require user interaction or elevated privileges beyond low-level privileges. Although no known exploits are currently observed in the wild, a public exploit has been published. Organizations using FastApiAdmin for administrative interfaces or user management should prioritize patching or mitigating this issue. The vulnerability has a CVSS 4. 0 score of 5.
AI-Powered Analysis
Technical Analysis
CVE-2026-2979 is a security vulnerability identified in FastApiAdmin, an administrative interface framework for FastAPI applications, affecting versions 2.0 through 2.2.0. The flaw resides in the user_avatar_upload_controller function within the Scheduled Task API component, located in the /backend/app/api/v1/module_system/user/controller.py file. This vulnerability allows an attacker to perform unrestricted file uploads remotely without requiring user interaction or elevated privileges beyond low-level access. The unrestricted upload means that the application does not properly validate or restrict the types, sizes, or contents of files uploaded via the avatar upload endpoint. Consequently, an attacker could upload malicious files such as web shells, scripts, or executables, potentially leading to remote code execution, privilege escalation, or persistent backdoors within the affected system. The vulnerability has been assigned a CVSS 4.0 base score of 5.3, indicating a medium severity level. The vector metrics indicate network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no confirmed exploits have been observed in the wild, a public exploit is available, increasing the risk of exploitation. The vulnerability affects organizations using FastApiAdmin for managing user avatars or administrative tasks, especially those exposing the API endpoint to untrusted networks. The lack of proper validation and access control in the upload function is the root cause, making it critical to implement strict file validation and access restrictions.
Potential Impact
The unrestricted file upload vulnerability in FastApiAdmin can have significant impacts on organizations worldwide. Attackers exploiting this flaw can upload malicious files that may lead to remote code execution, allowing full system compromise. This can result in data breaches, unauthorized access to sensitive information, disruption of services, and potential lateral movement within the network. The vulnerability's ease of exploitation and remote attack vector increase the risk of widespread attacks, especially in environments where FastApiAdmin is exposed to the internet or untrusted networks. Organizations relying on FastApiAdmin for administrative interfaces or user management may face reputational damage, regulatory penalties, and operational downtime if exploited. The medium severity score reflects moderate impact, but the potential for escalation to critical outcomes exists if combined with other vulnerabilities or misconfigurations. The absence of authentication or user interaction requirements lowers the barrier for attackers, making it a viable target for automated attacks or exploitation by less skilled adversaries.
Mitigation Recommendations
To mitigate CVE-2026-2979, organizations should immediately upgrade FastApiAdmin to a version where this vulnerability is patched once available. In the absence of an official patch, implement strict server-side validation of uploaded files, including checking file types, extensions, MIME types, and scanning for malicious content. Restrict upload permissions to authenticated and authorized users only, enforcing role-based access controls. Employ network-level protections such as web application firewalls (WAFs) to detect and block suspicious upload attempts. Isolate the upload directory from executable permissions to prevent execution of uploaded files. Monitor logs for unusual upload activity and conduct regular security audits of the affected API endpoints. Additionally, consider implementing content security policies and endpoint rate limiting to reduce attack surface. Educate developers and administrators about secure file handling practices and ensure secure coding standards are followed in future development. Finally, maintain an incident response plan to quickly address any exploitation attempts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-22T15:09:13.479Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699c1094be58cf853b5f1afa
Added to database: 2/23/2026, 8:32:20 AM
Last enriched: 2/23/2026, 8:46:33 AM
Last updated: 2/23/2026, 11:17:21 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-59873: Vulnerability in HCL Software ZIE for Web
MediumCVE-2025-3087: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in M-Files Corporation M-Files Web
MediumCVE-2025-3086: CWE-653 in M-Files Corporation M-Files Server
MediumCVE-2025-2159: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in M-Files Corporation M-Files Admin
MediumCVE-2025-0648: CWE-248 Uncaught Exception in M-Files Corporation M-Files Server
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.