Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 04 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Path Traversal in JeeSite File Upload Allowing Arbitrary File Write |
Mon, 04 May 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Sat, 02 May 2026 00:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Path Traversal in JeeSite File Upload Allowing Arbitrary File Write | |
| Weaknesses | CWE-22 |
Thu, 30 Apr 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Thinkgem
Thinkgem jeesite |
|
| Vendors & Products |
Thinkgem
Thinkgem jeesite |
Thu, 30 Apr 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue in the fileEntityId parameter in the /a/file/upload endpoint of JeeSite v5.15.1 allows authenticated attackers with file upload permissions to execute a path traversal and write arbitrary files with whitelisted suffixes to arbitrary filesystem locations. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-04T17:52:55.835Z
Reserved: 2026-04-06T00:00:00.000Z
Link: CVE-2026-36762
Updated: 2026-05-04T16:10:02.254Z
Status : Deferred
Published: 2026-04-30T18:16:29.263
Modified: 2026-05-04T18:16:28.487
Link: CVE-2026-36762
No data.
OpenCVE Enrichment
Updated: 2026-05-04T20:00:07Z