CVE-2026-36760
Deferred Deferred - Pending Action
Path Traversal in JeeSite File Upload via fileMd5 Parameter

Publication date: 2026-04-30

Last updated on: 2026-04-30

Assigner: MITRE

Description
An issue in the fileMd5 parameter in the /a/file/upload endpoint of JeeSite v5.15.1 allows authenticated attackers with file upload permissions to execute a path traversal and write arbitrary files with whitelisted suffixes to arbitrary filesystem locations while chunked upload is enabled.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-30
Last Modified
2026-04-30
Generated
2026-05-06
AI Q&A
2026-04-30
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
thinkgem jeesite to 5.15.1 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability in JeeSite allows authenticated attackers to perform path traversal and write arbitrary files to the filesystem, potentially leading to unauthorized data modification or exposure.

Such unauthorized file writes and potential data breaches could impact compliance with standards like GDPR and HIPAA, which require strict controls over data integrity, confidentiality, and protection against unauthorized access.

Specifically, the ability to write arbitrary files might lead to exposure or alteration of sensitive personal or health information, violating data protection requirements.

Remediation involves sanitizing the fileMd5 parameter to prevent path traversal, which is critical to maintaining compliance by protecting data integrity and confidentiality.


Can you explain this vulnerability to me?

This vulnerability exists in the fileMd5 parameter of the /a/file/upload endpoint in JeeSite version 5.15.1 and earlier when chunked file upload mode is enabled.

Authenticated attackers with file upload permissions can exploit this flaw to perform a path traversal attack, allowing them to write arbitrary files with whitelisted suffixes to any location on the filesystem.

The root cause is that the fileMd5 parameter is directly concatenated into the file path without proper sanitization, enabling attackers to use path traversal sequences (like ../../) to escape the intended directory.

Because the chunked upload process returns early before content-type validation, the malicious file is saved on disk regardless of its actual content.

To exploit this, attackers craft a payload with a prefix such as 'x/' followed by path traversal sequences to reach target locations outside the user-specific directory.


How can this vulnerability impact me? :

This vulnerability can allow an attacker with file upload permissions to write arbitrary files to any location on the server's filesystem.

Such unauthorized file writes can lead to overwriting critical system or application files, potentially resulting in remote code execution, privilege escalation, or disruption of service.

Because the attacker can bypass content-type validation, malicious files can be uploaded even if they do not match expected file types.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring and analyzing requests to the /a/file/upload endpoint, especially those that include the fileMd5 parameter with suspicious path traversal patterns such as sequences containing ../ or \ characters.

You can look for HTTP requests where the fileMd5 parameter contains payloads starting with a prefix like 'x/' followed by path traversal sequences (e.g., x/../../../../tmp/test.jar).

Example commands to detect such attempts might include using network traffic inspection tools or web server logs with grep or similar tools:

  • grep -r '/a/file/upload' /var/log/nginx/access.log | grep 'fileMd5=x/'
  • tcpdump -A -s 0 'tcp port 80 or tcp port 443' | grep 'fileMd5=x/'
  • Use a web application firewall (WAF) or IDS/IPS to detect and alert on path traversal patterns in the fileMd5 parameter.

What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation involves filtering and sanitizing the fileMd5 parameter to prevent path traversal characters such as '/', '\', and '..' from being used in file path construction.

Additionally, consider disabling chunked upload mode by setting the server configuration file.chunked=false if possible, to prevent exploitation via this attack vector.

Ensure that only authenticated users with proper file upload permissions can access the /a/file/upload endpoint.

Monitor logs for suspicious upload attempts and apply patches or updates from the vendor once available.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart