Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-29909: n/a

0
Unknown
VulnerabilityCVE-2026-29909cvecve-2026-29909
Published: Mon Mar 30 2026 (03/30/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

MRCMS V3.1.2 contains an unauthenticated directory enumeration vulnerability in the file management module. The /admin/file/list.do endpoint lacks authentication controls and proper input validation, allowing remote attackers to enumerate directory contents on the server without any credentials.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 16:53:51 UTC

Technical Analysis

CVE-2026-29909 identifies a security vulnerability in MRCMS version 3.1.2, specifically within its file management module. The vulnerability is an unauthenticated directory enumeration flaw located at the /admin/file/list.do endpoint. This endpoint fails to enforce authentication controls and lacks proper input validation, enabling remote attackers to access and enumerate directory contents on the server without any credentials. Directory enumeration can reveal sensitive file names, directory structures, and potentially configuration files or backup data, which can be leveraged for further attacks such as privilege escalation, code injection, or data exfiltration. The vulnerability does not require user interaction and can be exploited remotely, increasing its risk profile. Although no public exploits have been reported yet, the lack of authentication on an administrative endpoint is a critical oversight. The absence of a CVSS score suggests this is a newly disclosed issue, but based on the technical details, it poses a significant risk to confidentiality and potentially integrity. The vulnerability affects all deployments of MRCMS 3.1.2 that expose the vulnerable endpoint, especially those accessible over the internet. The lack of patch information indicates that users must implement manual mitigations until an official fix is released.

Potential Impact

The primary impact of CVE-2026-29909 is unauthorized information disclosure through directory enumeration. Attackers can gain insights into the server's file system structure, which may include sensitive files such as configuration files, user data, or backup archives. This information can be used to identify further vulnerabilities or entry points, facilitating more severe attacks like remote code execution or privilege escalation. Organizations relying on MRCMS 3.1.2 for content management or administrative functions are at risk of data leakage and potential compromise of their web infrastructure. The vulnerability's unauthenticated nature means attackers do not need valid credentials, increasing the attack surface. If exploited in targeted attacks, this could lead to reputational damage, regulatory penalties for data breaches, and operational disruptions. The impact is particularly severe for organizations with sensitive or regulated data hosted on vulnerable systems.

Mitigation Recommendations

To mitigate CVE-2026-29909, organizations should immediately restrict access to the /admin/file/list.do endpoint by implementing network-level controls such as IP whitelisting or VPN access to administrative interfaces. Enforce strong authentication mechanisms on all administrative endpoints to prevent unauthenticated access. Validate and sanitize all input parameters to the file management module to prevent directory enumeration and injection attacks. Monitor web server logs for unusual access patterns to the vulnerable endpoint to detect potential exploitation attempts. Until an official patch is released, consider disabling the file management module if feasible or deploying web application firewalls (WAFs) with custom rules to block unauthorized requests to the endpoint. Regularly update MRCMS to the latest versions once patches addressing this vulnerability become available. Conduct security assessments and penetration testing focused on administrative interfaces to identify similar weaknesses.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-03-04T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69caa6f9e6bfc5ba1d4dfd7e

Added to database: 3/30/2026, 4:38:17 PM

Last enriched: 3/30/2026, 4:53:51 PM

Last updated: 3/30/2026, 7:18:04 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses