CVE-2026-1111

Source
https://cve.org/CVERecord?id=CVE-2026-1111
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-1111.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-1111
Published
2026-01-18T06:16:01.007Z
Modified
2026-03-15T22:48:55.800590Z
Severity
  • 7.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A vulnerability has been found in Sanluan PublicCMS up to 5.202506.d. This impacts the function Save of the file com/publiccms/controller/admin/sys/TaskTemplateAdminController.java of the component Task Template Management Handler. Such manipulation of the argument path leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

References

Affected packages

Git / github.com/sanluan/publiccms

Affected ranges

Type
GIT
Repo
https://github.com/sanluan/publiccms
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "last_affected": "5.202506.d"
        }
    ]
}

Affected versions

Other
V2016
V4.*
V4.0.180707
V4.0.181024
V4.0.190312
V4.0.202004
V4.0.202011
V4.0.202107
V4.0.202107.b
V4.0.202107.c
V4.0.202107.d
V4.0.202107.f
V4.0.202204.a
V4.0.202204.b
V4.0.202204.c
V4.0.202204.d
V4.0.202302.a
V4.0.202302.b
V4.0.202302.c
V4.0.202302.d
V4.0.202302.e
V4.0.202302.f
V4.0.202406.a
V4.0.202406.b
V4.0.202406.c
V4.0.202406.d
V4.0.202406.e
V4.0.202406.f
V4.0.202506.a
V4.0.202506.b
V4.0.202506.c
V4.0.202506.d
V5.*
V5.202302.a
V5.202302.b
V5.202302.c
V5.202302.d
V5.202302.e
V5.202302.f
V5.202406.a
V5.202406.b
V5.202406.c
V5.202406.d
V5.202406.e
V5.202406.f
V5.202506.a
V5.202506.b
V5.202506.c
V5.202506.d

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-1111.json"