CVE-2026-3188

4.3 MEDIUM

📋 TL;DR

This CVE describes a path traversal vulnerability in feiyuchuixue sz-boot-parent up to version 1.3.2-beta. Attackers can manipulate the templateName parameter in the /api/admin/common/download/templates API endpoint to access arbitrary files on the server. Organizations using affected versions of this software are vulnerable to unauthorized file reading.

💻 Affected Systems

Products:
  • feiyuchuixue sz-boot-parent
Versions: Up to and including 1.3.2-beta
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the API component at /api/admin/common/download/templates endpoint

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive system files, configuration files, or application data, potentially leading to credential theft, data breaches, or further system compromise.

🟠

Likely Case

Unauthorized reading of application files, configuration files, or other sensitive data stored on the server.

🟢

If Mitigated

Limited impact with proper input validation and file access controls in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available and remote exploitation is possible

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.3.3-beta

Vendor Advisory: https://github.com/feiyuchuixue/sz-boot-parent/releases/tag/v1.3.3-beta

Restart Required: Yes

Instructions:

1. Backup current installation. 2. Download version 1.3.3-beta from the official repository. 3. Replace affected files with patched version. 4. Restart the application/service.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side validation to reject templateName parameters containing path traversal sequences

Implement regex filter: reject parameters containing '../', '..\\', or absolute paths

Access Control Restriction

all

Restrict file access to specific directories only

Configure application to only allow file access within designated template directories

🧯 If You Can't Patch

  • Implement WAF rules to block path traversal patterns in API requests
  • Restrict network access to the vulnerable endpoint using firewall rules

🔍 How to Verify

Check if Vulnerable:

Test the /api/admin/common/download/templates endpoint with templateName parameter containing path traversal sequences like '../../etc/passwd'

Check Version:

Check application version in configuration files or via application metadata

Verify Fix Applied:

After patching, test with same path traversal attempts - should return error or be blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns
  • API requests with '../' sequences in parameters
  • Failed file access attempts outside expected directories

Network Indicators:

  • HTTP requests to /api/admin/common/download/templates with suspicious parameter values
  • Unusual file download patterns

SIEM Query:

source="web_server" AND uri="/api/admin/common/download/templates" AND (param="*../*" OR param="*..\\*")

🔗 References

📤 Share & Export