CVE-2026-2684
Unrestricted File Upload Vulnerability in Tsinghua Unigroup Archives
Publication date: 2026-02-19
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| unigroup | electronic_archives_system | to 3.2.210802(62532 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-434 | The product allows the upload or transfer of dangerous file types that are automatically processed within its environment. |
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
Exploiting this vulnerability can lead to severe impacts including full system compromise. An attacker can execute arbitrary code, tamper with data, and deploy persistent backdoors.
Because the file upload is unrestricted and requires no authentication, attackers can easily exploit this flaw remotely, threatening the confidentiality, integrity, and availability of the affected system.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Vulnerable targets can be identified using Google dorking with the query: inurl:Archive/ErecordManage/uploadFile.html.
Since the vulnerability involves unrestricted file upload via the File argument in /Archive/ErecordManage/uploadFile.html, detection can involve monitoring HTTP requests to this endpoint for suspicious file upload attempts.
No specific detection commands are publicly provided, but network monitoring tools can be configured to alert on POST requests to /Archive/ErecordManage/uploadFile.html containing file upload data.
Can you explain this vulnerability to me?
CVE-2026-2684 is a critical vulnerability in the Tsinghua Unigroup Electronic Archives System up to version 3.2.210802(62532). It affects the file /Archive/ErecordManage/uploadFile.html, where improper handling of the File argument allows an attacker to perform unrestricted file uploads remotely without authentication.
This means an attacker can upload arbitrary files, potentially including malicious ones, to the system. The vulnerability corresponds to CWE-434 (Unrestricted File Upload) and can be exploited remotely, making it highly accessible.
What immediate steps should I take to mitigate this vulnerability?
No known countermeasures or mitigations are currently available from the vendor, as they did not respond to early disclosure attempts.
Immediate steps include restricting access to the vulnerable upload endpoint, such as by network segmentation, firewall rules, or disabling the upload functionality if possible.
Monitoring and blocking suspicious file upload attempts and applying strict input validation or file type restrictions if you have control over the system are recommended.
Since a proof-of-concept exploit is publicly available, urgent attention to access control and monitoring is critical to prevent exploitation.