Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6jq3-hpv3-f5mx

Опубликовано: 29 янв. 2026
Источник: github
Github: Не прошло ревью
CVSS4: 2.1
CVSS3: 4.3

Описание

A vulnerability was identified in jishenghua jshERP up to 3.6. Affected by this vulnerability is an unknown functionality of the file /jshERP-boot/plugin/uploadPluginConfigFile of the component PluginController. Such manipulation of the argument configFile leads to path traversal. The attack may be launched remotely. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.

A vulnerability was identified in jishenghua jshERP up to 3.6. Affected by this vulnerability is an unknown functionality of the file /jshERP-boot/plugin/uploadPluginConfigFile of the component PluginController. Such manipulation of the argument configFile leads to path traversal. The attack may be launched remotely. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.

EPSS

Процентиль: 16%
0.00051
Низкий

2.1 Low

CVSS4

4.3 Medium

CVSS3

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 4.3
nvd
12 дней назад

A vulnerability was identified in jishenghua jshERP up to 3.6. Affected by this vulnerability is an unknown functionality of the file /jshERP-boot/plugin/uploadPluginConfigFile of the component PluginController. Such manipulation of the argument configFile leads to path traversal. The attack may be launched remotely. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.

EPSS

Процентиль: 16%
0.00051
Низкий

2.1 Low

CVSS4

4.3 Medium

CVSS3

Дефекты

CWE-22