CVE-2026-22786

7.2 HIGH

📋 TL;DR

Gin-vue-admin versions up to 2.8.7 contain a path traversal vulnerability in the breakpoint resume upload functionality. Attackers with file upload privileges can write arbitrary files to any directory on the server by exploiting insufficient input validation. This affects all deployments using vulnerable versions of the gin-vue-admin backstage management system.

💻 Affected Systems

Products:
  • gin-vue-admin
Versions: <= v2.8.7
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires file upload privileges to exploit. The vulnerability exists in the default configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise through arbitrary file write leading to remote code execution, data exfiltration, or system takeover.

🟠

Likely Case

Unauthorized file upload to sensitive directories, potentially overwriting configuration files or deploying malicious scripts.

🟢

If Mitigated

Limited impact if proper file upload restrictions and input validation are already implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with file upload permissions. The vulnerability is straightforward to exploit once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v2.8.8 and later

Vendor Advisory: https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-3558-j79f-vvm6

Restart Required: Yes

Instructions:

1. Update gin-vue-admin to version 2.8.8 or later. 2. Restart the application server. 3. Verify the fix by checking the commit 2242f5d6e133e96d1b359ac019bf54fa0e975dd5 is applied.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side validation to reject file names containing directory traversal sequences.

Implement input sanitization in breakpoint_continue.go to filter out '../' sequences

File Upload Restriction

all

Restrict file upload functionality to authenticated users only and implement strict file type validation.

Add authentication middleware to /fileUploadAndDownload/breakpointContinueFinish endpoint

🧯 If You Can't Patch

  • Disable the breakpoint resume upload functionality entirely if not required.
  • Implement network-level controls to restrict access to the vulnerable endpoint.

🔍 How to Verify

Check if Vulnerable:

Check if running gin-vue-admin version <= 2.8.7 and examine breakpoint_continue.go for lack of path traversal validation.

Check Version:

Check package.json or application configuration for gin-vue-admin version

Verify Fix Applied:

Verify the application version is >= 2.8.8 and check that breakpoint_continue.go includes proper path sanitization.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload requests with '../' sequences in file names
  • File write operations to unexpected directories

Network Indicators:

  • HTTP POST requests to /fileUploadAndDownload/breakpointContinueFinish with suspicious file paths

SIEM Query:

source="web_logs" AND uri="/fileUploadAndDownload/breakpointContinueFinish" AND (file_name LIKE "%../%" OR file_name LIKE "%..\")

🔗 References

📤 Share & Export