CVE-2026-7024
Received Received - Intake
Path Traversal in rawchen sims DeleteFileServlet Endpoint

Publication date: 2026-04-26

Last updated on: 2026-04-29

Assigner: VulDB

Description
A flaw has been found in rawchen sims up to 004f783b1db5ecdfad81c8fdc3b34171211112de. Affected by this issue is some unknown functionality of the file sims-master/src/web/servlet/file/DeleteFileServlet.java of the component deleteFileServlet Endpoint. Executing a manipulation of the argument filename can lead to path traversal. The attack can be launched remotely. The exploit has been published and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-26
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-04-26
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

Exploiting this vulnerability can lead to deletion of critical system files, which may cause system paralysis, data loss, or complete service failure.


Can you explain this vulnerability to me?

CVE-2026-7024 is an Unauthorized Arbitrary File Delete vulnerability in the sims product, specifically in the DeleteFileServlet component. The vulnerability exists because the DeleteFileServlet does not perform any permission verification or access control, allowing unauthenticated users to invoke it directly.

The servlet accepts a filename parameter from the user without any input validation or filtering. This parameter is concatenated directly to the file path used for deletion, enabling attackers to perform directory traversal attacks (e.g., using "../") to delete arbitrary files on the server.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring HTTP requests to the DeleteFileServlet endpoint for suspicious filename parameters that include directory traversal patterns such as "../".

A simple detection method is to look for HTTP GET requests similar to the proof of concept, for example:

  • GET /downloadServlet?filename=../aaaa.txt HTTP/1.1

You can use network monitoring tools or web server logs to search for such requests. For example, using grep on web server logs:

  • grep -i 'filename=\.\./' access.log

Alternatively, using tools like tcpdump or Wireshark to capture HTTP traffic and filter for requests containing "filename=" with directory traversal sequences can help detect exploitation attempts.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to the DeleteFileServlet endpoint to authorized users only, as the vulnerability arises from lack of permission verification.

Additionally, input validation should be implemented to sanitize and validate the filename parameter to prevent directory traversal characters such as "../" from being processed.

If immediate code changes are not possible, consider network-level controls such as firewall rules or web application firewall (WAF) rules to block requests containing suspicious filename parameters.

Monitoring and alerting on suspicious requests targeting this endpoint can also help in early detection and response.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows unauthorized arbitrary file deletion via path traversal without any permission verification or access control. This can lead to deletion of critical system files, causing system paralysis, data loss, or complete service failure.

Such impacts could potentially affect compliance with common standards and regulations like GDPR and HIPAA, which require protection of data integrity, availability, and confidentiality. Data loss or service disruption caused by this vulnerability may result in non-compliance with these regulations.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart