CVE-2026-2978
Unrestricted File Upload in FastApiAdmin Scheduled Task API
Publication date: 2026-02-23
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| fastapiadmin | fastapiadmin | to 2.2.0 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-434 | The product allows the upload or transfer of dangerous file types that are automatically processed within its environment. |
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-2978 is an unrestricted file upload vulnerability found in FastApiAdmin versions up to 2.2.0. It affects the function upload_file_controller in the Scheduled Task API component. The vulnerability allows an attacker to upload arbitrary files to the server without proper validation or restrictions.
The upload process relies only on the Content-Type header to determine allowed file extensions and does not validate or canonicalize file paths, allowing attackers to bypass restrictions by disguising malicious files as allowed types.
This flaw can be exploited remotely and without authentication, enabling attackers to persist malicious files on the server, potentially leading to further attacks such as remote code execution.
How can this vulnerability impact me? :
This vulnerability can have serious impacts including compromising the confidentiality, integrity, and availability of your system.
- Attackers can upload malicious files that may be executed on the server, leading to remote code execution.
- Malicious files can persist on the server, potentially allowing attackers to maintain unauthorized access.
- The system may process dangerous file types automatically, increasing the risk of exploitation.
- There are no known mitigations or countermeasures currently identified, making the system vulnerable until patched or replaced.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability can be detected by monitoring and inspecting requests to the endpoint /api/v1/system/param/upload, which is vulnerable to unrestricted file uploads.'}, {'type': 'paragraph', 'content': 'Detection can involve checking for unusual or unauthorized file uploads, especially files with suspicious extensions or content disguised as allowed types.'}, {'type': 'paragraph', 'content': 'Commands to detect exploitation attempts might include:'}, {'type': 'list_item', 'content': 'Using web server logs to search for POST requests to /api/v1/system/param/upload, e.g., `grep "/api/v1/system/param/upload" /var/log/nginx/access.log`'}, {'type': 'list_item', 'content': 'Checking for recently uploaded files with suspicious extensions or unexpected file types in the upload directory, e.g., `find /path/to/upload/dir -type f \\( -name "*.py" -o -name "*.php" \\) -ls`'}, {'type': 'list_item', 'content': 'Using file command or magic byte inspection to verify if uploaded files match their claimed content types.'}, {'type': 'list_item', 'content': 'Monitoring for scheduled tasks that execute uploaded files, which could indicate exploitation.'}] [3]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include:
- Enforce server-side content inspection by validating the actual file content (magic bytes) rather than relying on the Content-Type header.
- Derive file extensions from the actual content and implement strict allowlists for permitted upload types.
- Normalize and restrict file paths to a safe upload directory that does not have execute permissions.
- Generate randomized safe filenames to prevent overwriting or predictable file placement.
- Scan uploaded files for dangerous content before processing or storing them.
- Apply least-privilege access controls and audit logging for both upload and scheduled task APIs.
If possible, consider replacing or upgrading the affected FastApiAdmin version, as no known patches or countermeasures have been identified.