Description
MRCMS V3.1.2 contains an unauthenticated directory enumeration vulnerability in the file management module. The /admin/file/list.do endpoint lacks authentication controls and proper input validation, allowing remote attackers to enumerate directory contents on the server without any credentials.
Published: 2026-03-30
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Directory enumeration (information disclosure)
Action: Apply patch
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
Title Unauthenticated Directory Enumeration in MRCMS V3.1.2 File Management

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Title Unauthenticated Directory Enumeration in MRCMS V3.1.2 File Management
First Time appeared Mrcms
Mrcms mrcms
CPEs cpe:2.3:a:mrcms:mrcms:3.1.2:*:*:*:*:*:*:*
Vendors & Products Mrcms
Mrcms mrcms

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
Title Unauthenticated Directory Enumeration in MRCMS V3.1.2 File Management Module
Weaknesses CWE-284

Tue, 31 Mar 2026 03:00:00 +0000

Type Values Removed Values Added
Title Unauthenticated Directory Enumeration in MRCMS V3.1.2 File Management Module
Weaknesses CWE-284

Mon, 30 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20
CWE-425
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 30 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
Description MRCMS V3.1.2 contains an unauthenticated directory enumeration vulnerability in the file management module. The /admin/file/list.do endpoint lacks authentication controls and proper input validation, allowing remote attackers to enumerate directory contents on the server without any credentials.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-03-30T19:24:14.343Z

Reserved: 2026-03-04T00:00:00.000Z

Link: CVE-2026-29909

cve-icon Vulnrichment

Updated: 2026-03-30T19:22:30.206Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-30T17:16:15.750

Modified: 2026-04-02T17:11:00.893

Link: CVE-2026-29909

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:38:24Z

Weaknesses