Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Workaround
Reset the secret and password using custom tool provided by ShareFile
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 21 Apr 2026 00:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:progress:sharefile_storage_zones_controller:*:*:*:*:*:*:*:* |
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Progress
Progress sharefile Storage Zones Controller |
|
| Vendors & Products |
Progress
Progress sharefile Storage Zones Controller |
Thu, 02 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 02 Apr 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Authenticated user can upload a malicious file to the server and execute it, which leads to remote code execution. | |
| Title | RCE vulnerability in Progress ShareFile Storage Zones Controller (SZC) | |
| Weaknesses | CWE-434 CWE-78 CWE-94 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: ProgressSoftware
Published:
Updated: 2026-04-03T03:55:26.174Z
Reserved: 2026-02-18T17:20:44.202Z
Link: CVE-2026-2701
Updated: 2026-04-02T13:48:41.958Z
Status : Analyzed
Published: 2026-04-02T14:16:27.917
Modified: 2026-04-21T00:28:12.500
Link: CVE-2026-2701
No data.
OpenCVE Enrichment
Updated: 2026-04-02T20:21:16Z