CVE-2026-4999
Path Traversal in z-9527 uploadFile Enables Remote Exploitation
Publication date: 2026-03-28
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-4999 is an unrestricted file upload vulnerability in the Z-9527 Admin software affecting versions up to a specific commit. The issue occurs in the uploadFile function of the /server/utils/upload.js file, where the fileType parameter is used to construct file paths without proper validation or sanitization.
Because the fileType parameter is not sanitized, attackers can perform directory traversal by including sequences like '..' in the fileType value. This allows them to write files outside the intended upload directory, potentially overwriting important files on the server.
Additionally, the filename is used as-is without safe renaming or sanitization, increasing the risk of overwriting critical files. The vulnerability can be exploited remotely by authenticated attackers, and the isImg parameter check for image files can be bypassed by omitting it, allowing upload of arbitrary file types.
How can this vulnerability impact me? :
This vulnerability can allow an attacker to upload arbitrary files to the server in unauthorized locations by exploiting directory traversal in the fileType parameter.
Such unauthorized file uploads can lead to overwriting important files, potentially causing denial of service, data corruption, or enabling further attacks such as remote code execution if malicious scripts are uploaded.
Because the upload service may run with higher privileges and files can be placed outside the intended directories, the overall security and integrity of the server and application can be severely compromised.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring and testing the `/upload` endpoint for unrestricted file upload attempts that exploit the `fileType` parameter for directory traversal.
You can attempt to upload a file using crafted requests that include directory traversal sequences (e.g., `..`) in the `fileType` parameter to see if files are written outside the intended directory.
Example commands using curl to test the vulnerability might include:
- curl -v -F "[email protected]" "http://target/upload?fileType=../tmp&isImg=false"
- curl -v -F "[email protected]" "http://target/upload?fileType=../../../../tmp&isImg=false"
Additionally, checking server logs for unexpected file writes outside the upload directory or unusual file paths can help detect exploitation attempts.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include:
- Implement a server-side whitelist for the `fileType` parameter to restrict uploads to allowed directories only.
- Canonicalize and verify that resolved file paths remain within a fixed upload root directory to prevent directory traversal.
- Reject any directory traversal sequences or absolute paths in the `fileType` parameter.
- Generate safe server-side filenames instead of using client-supplied names to avoid overwriting important files.
- Validate uploaded file content by checking magic bytes and file size to ensure only expected file types are accepted.
- Store uploaded files outside the webroot to reduce the risk of direct web access.
- Run the upload service with least privilege to limit the impact of a successful exploit.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows authenticated attackers to upload arbitrary files to the server via an unsanitized fileType parameter, enabling directory traversal and potential overwriting of important files.
Such unauthorized file uploads and potential data manipulation can lead to unauthorized access, data breaches, or data integrity issues, which may violate compliance requirements under standards like GDPR and HIPAA that mandate protection of personal and sensitive data.
Failure to properly validate and restrict file uploads could result in exposure of sensitive information or disruption of services, thereby impacting the organization's ability to meet regulatory obligations for data security and privacy.