CVE-2026-4999
Received Received - Intake
Path Traversal in z-9527 uploadFile Enables Remote Exploitation

Publication date: 2026-03-28

Last updated on: 2026-04-29

Assigner: VulDB

Description
A security vulnerability has been detected in z-9527 admin up to 72aaf2dd05cf4ec2e98f390668b41e128eec5ad2. This issue affects the function uploadFile of the file /server/utils/upload.js of the component isImg Check. The manipulation of the argument fileType leads to path traversal. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-28
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-03-28
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-4999 is an unrestricted file upload vulnerability in the Z-9527 Admin software affecting versions up to a specific commit. The issue occurs in the uploadFile function of the /server/utils/upload.js file, where the fileType parameter is used to construct file paths without proper validation or sanitization.

Because the fileType parameter is not sanitized, attackers can perform directory traversal by including sequences like '..' in the fileType value. This allows them to write files outside the intended upload directory, potentially overwriting important files on the server.

Additionally, the filename is used as-is without safe renaming or sanitization, increasing the risk of overwriting critical files. The vulnerability can be exploited remotely by authenticated attackers, and the isImg parameter check for image files can be bypassed by omitting it, allowing upload of arbitrary file types.


How can this vulnerability impact me? :

This vulnerability can allow an attacker to upload arbitrary files to the server in unauthorized locations by exploiting directory traversal in the fileType parameter.

Such unauthorized file uploads can lead to overwriting important files, potentially causing denial of service, data corruption, or enabling further attacks such as remote code execution if malicious scripts are uploaded.

Because the upload service may run with higher privileges and files can be placed outside the intended directories, the overall security and integrity of the server and application can be severely compromised.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring and testing the `/upload` endpoint for unrestricted file upload attempts that exploit the `fileType` parameter for directory traversal.

You can attempt to upload a file using crafted requests that include directory traversal sequences (e.g., `..`) in the `fileType` parameter to see if files are written outside the intended directory.

Example commands using curl to test the vulnerability might include:

Additionally, checking server logs for unexpected file writes outside the upload directory or unusual file paths can help detect exploitation attempts.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include:

  • Implement a server-side whitelist for the `fileType` parameter to restrict uploads to allowed directories only.
  • Canonicalize and verify that resolved file paths remain within a fixed upload root directory to prevent directory traversal.
  • Reject any directory traversal sequences or absolute paths in the `fileType` parameter.
  • Generate safe server-side filenames instead of using client-supplied names to avoid overwriting important files.
  • Validate uploaded file content by checking magic bytes and file size to ensure only expected file types are accepted.
  • Store uploaded files outside the webroot to reduce the risk of direct web access.
  • Run the upload service with least privilege to limit the impact of a successful exploit.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows authenticated attackers to upload arbitrary files to the server via an unsanitized fileType parameter, enabling directory traversal and potential overwriting of important files.

Such unauthorized file uploads and potential data manipulation can lead to unauthorized access, data breaches, or data integrity issues, which may violate compliance requirements under standards like GDPR and HIPAA that mandate protection of personal and sensitive data.

Failure to properly validate and restrict file uploads could result in exposure of sensitive information or disruption of services, thereby impacting the organization's ability to meet regulatory obligations for data security and privacy.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart