CVE-2026-3188: Path Traversal in feiyuchuixue sz-boot-parent
A security flaw has been discovered in feiyuchuixue sz-boot-parent up to 1.3.2-beta. This affects an unknown part of the file /api/admin/common/download/templates of the component API. Performing a manipulation of the argument templateName results in path traversal. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks. Upgrading to version 1.3.3-beta is able to mitigate this issue. The patch is named aefaabfd7527188bfba3c8c9eee17c316d094802. It is recommended to upgrade the affected component. The project was informed beforehand and acted very professional: "We have implemented path validity checks on parameters for the template download interface (...)"
AI Analysis
Technical Summary
CVE-2026-3188 is a path traversal vulnerability identified in the feiyuchuixue sz-boot-parent software component, specifically affecting versions up to 1.3.2-beta. The vulnerability resides in the API endpoint /api/admin/common/download/templates, where the templateName parameter is insufficiently validated. An attacker can manipulate this parameter to traverse the file system directory structure, potentially accessing sensitive files outside the intended directory scope. This type of vulnerability arises when user input is not properly sanitized, allowing directory traversal sequences (e.g., ../) to access restricted files. The vulnerability is remotely exploitable without requiring authentication or user interaction, making it accessible to unauthenticated attackers over the network. The vendor has released a patch in version 1.3.3-beta that introduces path validity checks to ensure that the templateName parameter cannot be used to access unauthorized paths. The patch is identified by commit aefaabfd7527188bfba3c8c9eee17c316d094802. While no active exploitation has been observed in the wild, a public exploit is available, increasing the risk of attacks. The CVSS 4.0 base score is 5.3, reflecting medium severity due to the ease of exploitation and potential confidentiality impact, but limited integrity and availability impact. The vulnerability does not require privileges or user interaction, and the scope is limited to the affected component. Organizations using the vulnerable versions should prioritize upgrading to the fixed version to prevent unauthorized file access and potential data leakage.
Potential Impact
The primary impact of this vulnerability is unauthorized disclosure of sensitive files on affected systems. Attackers exploiting this flaw can read arbitrary files accessible to the application process, potentially exposing configuration files, credentials, or other sensitive data. This can lead to further compromise if attackers gain information to escalate privileges or move laterally within the network. Although the vulnerability does not directly affect system integrity or availability, the confidentiality breach can have significant consequences, including data leaks, intellectual property theft, or exposure of internal system details. Since the vulnerability is remotely exploitable without authentication, it poses a risk to any exposed instances of the vulnerable software, especially in internet-facing environments. Organizations relying on feiyuchuixue sz-boot-parent 1.3.2-beta or earlier versions may face increased risk of targeted attacks or opportunistic scanning. The availability of a public exploit increases the likelihood of exploitation attempts. The impact is particularly critical for organizations handling sensitive or regulated data, as unauthorized file access could violate compliance requirements and damage reputation.
Mitigation Recommendations
To mitigate this vulnerability, organizations should upgrade the feiyuchuixue sz-boot-parent component to version 1.3.3-beta or later, which contains the official patch implementing path validity checks on the templateName parameter. If immediate upgrade is not feasible, organizations should implement strict input validation and sanitization on the templateName parameter to prevent directory traversal sequences. Deploying web application firewalls (WAFs) with rules to detect and block path traversal attempts targeting the /api/admin/common/download/templates endpoint can provide temporary protection. Restricting network access to the vulnerable API endpoint through segmentation or firewall rules can reduce exposure. Additionally, monitoring logs for suspicious requests containing directory traversal patterns can help detect exploitation attempts early. Regularly auditing file permissions and ensuring the application runs with the least privilege necessary will limit the impact of any successful exploit. Finally, organizations should stay informed about updates from the vendor and apply security patches promptly to maintain protection.
Affected Countries
China, United States, India, Germany, Japan, South Korea, United Kingdom, France, Brazil, Russia
CVE-2026-3188: Path Traversal in feiyuchuixue sz-boot-parent
Description
A security flaw has been discovered in feiyuchuixue sz-boot-parent up to 1.3.2-beta. This affects an unknown part of the file /api/admin/common/download/templates of the component API. Performing a manipulation of the argument templateName results in path traversal. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks. Upgrading to version 1.3.3-beta is able to mitigate this issue. The patch is named aefaabfd7527188bfba3c8c9eee17c316d094802. It is recommended to upgrade the affected component. The project was informed beforehand and acted very professional: "We have implemented path validity checks on parameters for the template download interface (...)"
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-3188 is a path traversal vulnerability identified in the feiyuchuixue sz-boot-parent software component, specifically affecting versions up to 1.3.2-beta. The vulnerability resides in the API endpoint /api/admin/common/download/templates, where the templateName parameter is insufficiently validated. An attacker can manipulate this parameter to traverse the file system directory structure, potentially accessing sensitive files outside the intended directory scope. This type of vulnerability arises when user input is not properly sanitized, allowing directory traversal sequences (e.g., ../) to access restricted files. The vulnerability is remotely exploitable without requiring authentication or user interaction, making it accessible to unauthenticated attackers over the network. The vendor has released a patch in version 1.3.3-beta that introduces path validity checks to ensure that the templateName parameter cannot be used to access unauthorized paths. The patch is identified by commit aefaabfd7527188bfba3c8c9eee17c316d094802. While no active exploitation has been observed in the wild, a public exploit is available, increasing the risk of attacks. The CVSS 4.0 base score is 5.3, reflecting medium severity due to the ease of exploitation and potential confidentiality impact, but limited integrity and availability impact. The vulnerability does not require privileges or user interaction, and the scope is limited to the affected component. Organizations using the vulnerable versions should prioritize upgrading to the fixed version to prevent unauthorized file access and potential data leakage.
Potential Impact
The primary impact of this vulnerability is unauthorized disclosure of sensitive files on affected systems. Attackers exploiting this flaw can read arbitrary files accessible to the application process, potentially exposing configuration files, credentials, or other sensitive data. This can lead to further compromise if attackers gain information to escalate privileges or move laterally within the network. Although the vulnerability does not directly affect system integrity or availability, the confidentiality breach can have significant consequences, including data leaks, intellectual property theft, or exposure of internal system details. Since the vulnerability is remotely exploitable without authentication, it poses a risk to any exposed instances of the vulnerable software, especially in internet-facing environments. Organizations relying on feiyuchuixue sz-boot-parent 1.3.2-beta or earlier versions may face increased risk of targeted attacks or opportunistic scanning. The availability of a public exploit increases the likelihood of exploitation attempts. The impact is particularly critical for organizations handling sensitive or regulated data, as unauthorized file access could violate compliance requirements and damage reputation.
Mitigation Recommendations
To mitigate this vulnerability, organizations should upgrade the feiyuchuixue sz-boot-parent component to version 1.3.3-beta or later, which contains the official patch implementing path validity checks on the templateName parameter. If immediate upgrade is not feasible, organizations should implement strict input validation and sanitization on the templateName parameter to prevent directory traversal sequences. Deploying web application firewalls (WAFs) with rules to detect and block path traversal attempts targeting the /api/admin/common/download/templates endpoint can provide temporary protection. Restricting network access to the vulnerable API endpoint through segmentation or firewall rules can reduce exposure. Additionally, monitoring logs for suspicious requests containing directory traversal patterns can help detect exploitation attempts early. Regularly auditing file permissions and ensuring the application runs with the least privilege necessary will limit the impact of any successful exploit. Finally, organizations should stay informed about updates from the vendor and apply security patches promptly to maintain protection.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-25T08:32:13.474Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699f6e70b7ef31ef0b5a0a2d
Added to database: 2/25/2026, 9:49:36 PM
Last enriched: 3/5/2026, 9:53:45 AM
Last updated: 4/12/2026, 1:19:20 PM
Views: 68
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.