Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3187: Unrestricted Upload in feiyuchuixue sz-boot-parent

0
Medium
VulnerabilityCVE-2026-3187cvecve-2026-3187
Published: Wed Feb 25 2026 (02/25/2026, 14:32:09 UTC)
Source: CVE Database V5
Vendor/Project: feiyuchuixue
Product: sz-boot-parent

Description

A vulnerability was identified in feiyuchuixue sz-boot-parent up to 1.3.2-beta. Affected by this issue is some unknown functionality of the file /api/admin/sys-file/upload of the component API Endpoint. Such manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit is publicly available and might be used. Upgrading to version 1.3.3-beta can resolve this issue. The name of the patch is aefaabfd7527188bfba3c8c9eee17c316d094802. Upgrading the affected component is recommended. The project was informed beforehand and acted very professional: "We have introduced a whitelist restriction on the /api/admin/sys-file/upload endpoint via the oss.allowedExts and oss.allowedMimeTypes configuration options, allowing the specification of permitted file extensions and MIME types for uploads."

AI-Powered Analysis

AILast updated: 02/25/2026, 14:56:34 UTC

Technical Analysis

CVE-2026-3187 is a vulnerability in the feiyuchuixue sz-boot-parent project, specifically affecting versions up to 1.3.2-beta. The flaw exists in the API endpoint /api/admin/sys-file/upload, which lacks adequate restrictions on file uploads, allowing attackers to upload arbitrary files without proper validation. This unrestricted upload can be exploited remotely without authentication or user interaction, enabling attackers to potentially upload malicious files such as web shells or malware. The vulnerability impacts confidentiality, integrity, and availability by allowing unauthorized file placement that could lead to code execution, data leakage, or service disruption. The vendor addressed the issue in version 1.3.3-beta by implementing whitelist restrictions on file extensions and MIME types through configuration options oss.allowedExts and oss.allowedMimeTypes. The patch is identified by commit aefaabfd7527188bfba3c8c9eee17c316d094802. Although a public exploit exists, no known widespread exploitation has been reported. The vulnerability has a CVSS 4.0 score of 5.3, reflecting medium severity due to ease of exploitation but limited scope and impact. Organizations using the affected component, especially in administrative contexts, should upgrade and configure strict upload restrictions to prevent exploitation.

Potential Impact

The unrestricted upload vulnerability can lead to significant security risks for organizations using the feiyuchuixue sz-boot-parent software. Attackers could upload malicious files such as web shells, ransomware, or other malware, potentially resulting in unauthorized remote code execution, data breaches, or service outages. This compromises confidentiality by exposing sensitive data, integrity by allowing unauthorized modifications, and availability by enabling denial-of-service conditions. Since the vulnerability requires no user interaction and can be exploited remotely, it increases the attack surface considerably. Organizations with exposed administrative upload endpoints are particularly vulnerable. The presence of a public exploit increases the likelihood of opportunistic attacks. While the vulnerability is medium severity, the potential for lateral movement and further compromise in enterprise environments elevates the risk. Failure to patch could lead to regulatory compliance issues and reputational damage if exploited.

Mitigation Recommendations

1. Upgrade the feiyuchuixue sz-boot-parent component to version 1.3.3-beta or later, which includes the official patch restricting file uploads. 2. Configure the oss.allowedExts and oss.allowedMimeTypes options to enforce strict whitelisting of permitted file types, minimizing the risk of malicious uploads. 3. Implement additional server-side validation and scanning of uploaded files using antivirus and malware detection tools. 4. Restrict access to the /api/admin/sys-file/upload endpoint to trusted administrators and internal networks via network segmentation and firewall rules. 5. Monitor logs for unusual upload activity or attempts to upload disallowed file types. 6. Employ web application firewalls (WAFs) with rules tuned to detect and block suspicious upload patterns. 7. Conduct regular security assessments and penetration testing focused on file upload functionalities. 8. Educate developers and administrators on secure file handling best practices to prevent similar issues in future development cycles.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-25T08:32:10.390Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699f0a1db7ef31ef0b25eb10

Added to database: 2/25/2026, 2:41:33 PM

Last enriched: 2/25/2026, 2:56:34 PM

Last updated: 2/26/2026, 6:01:17 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats