Description
Authenticated user can upload a malicious file to the server and execute it, which leads to remote code execution.
Published: 2026-04-02
Score: 9.1 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

Vendor Workaround

Reset the secret and password using custom tool provided by ShareFile

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 21 Apr 2026 00:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:progress:sharefile_storage_zones_controller:*:*:*:*:*:*:*:*

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Progress
Progress sharefile Storage Zones Controller
Vendors & Products Progress
Progress sharefile Storage Zones Controller

Thu, 02 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 02 Apr 2026 13:45:00 +0000

Type Values Removed Values Added
Description Authenticated user can upload a malicious file to the server and execute it, which leads to remote code execution.
Title RCE vulnerability in Progress ShareFile Storage Zones Controller (SZC)
Weaknesses CWE-434
CWE-78
CWE-94
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}


Subscriptions

Progress Sharefile Storage Zones Controller
cve-icon MITRE

Status: PUBLISHED

Assigner: ProgressSoftware

Published:

Updated: 2026-04-03T03:55:26.174Z

Reserved: 2026-02-18T17:20:44.202Z

Link: CVE-2026-2701

cve-icon Vulnrichment

Updated: 2026-04-02T13:48:41.958Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-02T14:16:27.917

Modified: 2026-04-21T00:28:12.500

Link: CVE-2026-2701

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:21:16Z

Weaknesses