CVE-2026-7673
Received Received - Intake
Unrestricted File Upload in crmeb_java

Publication date: 2026-05-03

Last updated on: 2026-05-03

Assigner: VulDB

Description
A vulnerability was detected in crmeb_java up to 1.3.4. This vulnerability affects unknown code of the file crmeb/crmeb-service/src/main/java/com/zbkj/service/service/impl/UploadServiceImpl.java of the component Admin Upload. Performing a manipulation of the argument model results in unrestricted upload. Remote exploitation of the attack is possible. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-03
Last Modified
2026-05-03
Generated
2026-05-07
AI Q&A
2026-05-03
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-434 The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the crmeb_java software up to version 1.3.4, specifically in the Admin Upload component within the UploadServiceImpl.java file. It arises from improper handling of the 'model' argument, which allows an attacker to perform unrestricted file uploads. This means that an attacker can remotely exploit this flaw to upload arbitrary files to the system without proper restrictions.


How can this vulnerability impact me? :

The vulnerability can lead to unauthorized file uploads, which may allow attackers to upload malicious files such as web shells or malware. This can compromise the integrity and security of the affected system, potentially leading to data breaches, system takeover, or further exploitation. Since the exploit is publicly available, the risk of remote attacks is increased.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart