CVE-2026-3187: Unrestricted Upload in feiyuchuixue sz-boot-parent
A vulnerability was identified in feiyuchuixue sz-boot-parent up to 1.3.2-beta. Affected by this issue is some unknown functionality of the file /api/admin/sys-file/upload of the component API Endpoint. Such manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit is publicly available and might be used. Upgrading to version 1.3.3-beta can resolve this issue. The name of the patch is aefaabfd7527188bfba3c8c9eee17c316d094802. Upgrading the affected component is recommended. The project was informed beforehand and acted very professional: "We have introduced a whitelist restriction on the /api/admin/sys-file/upload endpoint via the oss.allowedExts and oss.allowedMimeTypes configuration options, allowing the specification of permitted file extensions and MIME types for uploads."
AI Analysis
Technical Summary
CVE-2026-3187 is a vulnerability in the feiyuchuixue sz-boot-parent project, specifically affecting versions up to 1.3.2-beta. The flaw exists in the API endpoint /api/admin/sys-file/upload, which lacks adequate restrictions on file uploads, allowing attackers to upload arbitrary files without proper validation. This unrestricted upload can be exploited remotely without authentication or user interaction, enabling attackers to potentially upload malicious files such as web shells or malware. The vulnerability impacts confidentiality, integrity, and availability by allowing unauthorized file placement that could lead to code execution, data leakage, or service disruption. The vendor addressed the issue in version 1.3.3-beta by implementing whitelist restrictions on file extensions and MIME types through configuration options oss.allowedExts and oss.allowedMimeTypes. The patch is identified by commit aefaabfd7527188bfba3c8c9eee17c316d094802. Although a public exploit exists, no known widespread exploitation has been reported. The vulnerability has a CVSS 4.0 score of 5.3, reflecting medium severity due to ease of exploitation but limited scope and impact. Organizations using the affected component, especially in administrative contexts, should upgrade and configure strict upload restrictions to prevent exploitation.
Potential Impact
The unrestricted upload vulnerability can lead to significant security risks for organizations using the feiyuchuixue sz-boot-parent software. Attackers could upload malicious files such as web shells, ransomware, or other malware, potentially resulting in unauthorized remote code execution, data breaches, or service outages. This compromises confidentiality by exposing sensitive data, integrity by allowing unauthorized modifications, and availability by enabling denial-of-service conditions. Since the vulnerability requires no user interaction and can be exploited remotely, it increases the attack surface considerably. Organizations with exposed administrative upload endpoints are particularly vulnerable. The presence of a public exploit increases the likelihood of opportunistic attacks. While the vulnerability is medium severity, the potential for lateral movement and further compromise in enterprise environments elevates the risk. Failure to patch could lead to regulatory compliance issues and reputational damage if exploited.
Mitigation Recommendations
1. Upgrade the feiyuchuixue sz-boot-parent component to version 1.3.3-beta or later, which includes the official patch restricting file uploads. 2. Configure the oss.allowedExts and oss.allowedMimeTypes options to enforce strict whitelisting of permitted file types, minimizing the risk of malicious uploads. 3. Implement additional server-side validation and scanning of uploaded files using antivirus and malware detection tools. 4. Restrict access to the /api/admin/sys-file/upload endpoint to trusted administrators and internal networks via network segmentation and firewall rules. 5. Monitor logs for unusual upload activity or attempts to upload disallowed file types. 6. Employ web application firewalls (WAFs) with rules tuned to detect and block suspicious upload patterns. 7. Conduct regular security assessments and penetration testing focused on file upload functionalities. 8. Educate developers and administrators on secure file handling best practices to prevent similar issues in future development cycles.
Affected Countries
China, United States, India, Germany, Japan, South Korea, Brazil, United Kingdom, France, Russia
CVE-2026-3187: Unrestricted Upload in feiyuchuixue sz-boot-parent
Description
A vulnerability was identified in feiyuchuixue sz-boot-parent up to 1.3.2-beta. Affected by this issue is some unknown functionality of the file /api/admin/sys-file/upload of the component API Endpoint. Such manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit is publicly available and might be used. Upgrading to version 1.3.3-beta can resolve this issue. The name of the patch is aefaabfd7527188bfba3c8c9eee17c316d094802. Upgrading the affected component is recommended. The project was informed beforehand and acted very professional: "We have introduced a whitelist restriction on the /api/admin/sys-file/upload endpoint via the oss.allowedExts and oss.allowedMimeTypes configuration options, allowing the specification of permitted file extensions and MIME types for uploads."
AI-Powered Analysis
Technical Analysis
CVE-2026-3187 is a vulnerability in the feiyuchuixue sz-boot-parent project, specifically affecting versions up to 1.3.2-beta. The flaw exists in the API endpoint /api/admin/sys-file/upload, which lacks adequate restrictions on file uploads, allowing attackers to upload arbitrary files without proper validation. This unrestricted upload can be exploited remotely without authentication or user interaction, enabling attackers to potentially upload malicious files such as web shells or malware. The vulnerability impacts confidentiality, integrity, and availability by allowing unauthorized file placement that could lead to code execution, data leakage, or service disruption. The vendor addressed the issue in version 1.3.3-beta by implementing whitelist restrictions on file extensions and MIME types through configuration options oss.allowedExts and oss.allowedMimeTypes. The patch is identified by commit aefaabfd7527188bfba3c8c9eee17c316d094802. Although a public exploit exists, no known widespread exploitation has been reported. The vulnerability has a CVSS 4.0 score of 5.3, reflecting medium severity due to ease of exploitation but limited scope and impact. Organizations using the affected component, especially in administrative contexts, should upgrade and configure strict upload restrictions to prevent exploitation.
Potential Impact
The unrestricted upload vulnerability can lead to significant security risks for organizations using the feiyuchuixue sz-boot-parent software. Attackers could upload malicious files such as web shells, ransomware, or other malware, potentially resulting in unauthorized remote code execution, data breaches, or service outages. This compromises confidentiality by exposing sensitive data, integrity by allowing unauthorized modifications, and availability by enabling denial-of-service conditions. Since the vulnerability requires no user interaction and can be exploited remotely, it increases the attack surface considerably. Organizations with exposed administrative upload endpoints are particularly vulnerable. The presence of a public exploit increases the likelihood of opportunistic attacks. While the vulnerability is medium severity, the potential for lateral movement and further compromise in enterprise environments elevates the risk. Failure to patch could lead to regulatory compliance issues and reputational damage if exploited.
Mitigation Recommendations
1. Upgrade the feiyuchuixue sz-boot-parent component to version 1.3.3-beta or later, which includes the official patch restricting file uploads. 2. Configure the oss.allowedExts and oss.allowedMimeTypes options to enforce strict whitelisting of permitted file types, minimizing the risk of malicious uploads. 3. Implement additional server-side validation and scanning of uploaded files using antivirus and malware detection tools. 4. Restrict access to the /api/admin/sys-file/upload endpoint to trusted administrators and internal networks via network segmentation and firewall rules. 5. Monitor logs for unusual upload activity or attempts to upload disallowed file types. 6. Employ web application firewalls (WAFs) with rules tuned to detect and block suspicious upload patterns. 7. Conduct regular security assessments and penetration testing focused on file upload functionalities. 8. Educate developers and administrators on secure file handling best practices to prevent similar issues in future development cycles.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-25T08:32:10.390Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699f0a1db7ef31ef0b25eb10
Added to database: 2/25/2026, 2:41:33 PM
Last enriched: 2/25/2026, 2:56:34 PM
Last updated: 2/26/2026, 6:01:17 AM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.