CVE-2026-5261
Received Received - Intake
Unrestricted File Upload in Shandong Hoteam InforCenter PLM

Publication date: 2026-04-01

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability was identified in Shandong Hoteam InforCenter PLM up to 8.3.8. The impacted element is the function uploadFileToIIS of the file /Base/BaseHandler.ashx. The manipulation of the argument File leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-01
Last Modified
2026-04-29
Generated
2026-05-06
AI Q&A
2026-04-01
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
shandong_hoteam inforcenter_plm to 8.3.8 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-434 The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in Shandong Hoteam InforCenter PLM up to version 8.3.8, specifically in the function uploadFileToIIS within the file /Base/BaseHandler.ashx. The issue arises from improper handling of the File argument, which allows an attacker to upload files without restriction.

The attack can be initiated remotely, and there is a publicly available exploit that could be used to take advantage of this vulnerability.

The vendor was informed early about this issue but did not provide any response.


How can this vulnerability impact me? :

This vulnerability can allow an attacker to upload arbitrary files to the affected system remotely. Such unrestricted file upload can lead to several impacts including unauthorized code execution, system compromise, data breach, or disruption of service.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart