CVE-2026-1588

Source
https://cve.org/CVERecord?id=CVE-2026-1588
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-1588.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-1588
Published
2026-01-29T14:16:13.260Z
Modified
2026-03-13T07:57:10.981881Z
Severity
  • 2.0 (Low) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X CVSS Calculator
Summary
[none]
Details

A vulnerability was found in jishenghua jshERP up to 3.6. The impacted element is the function install of the file /jshERP-boot/plugin/installByPath of the component com.gitee.starblues.integration.operator.DefaultPluginOperator. The manipulation of the argument path results in path traversal. It is possible to launch the attack remotely. The exploit has been made public and could be used. The project was informed of the problem early through an issue report but has not responded yet.

References

Affected packages

Git / github.com/jishenghua/jsherp

Affected ranges

Type
GIT
Repo
https://github.com/jishenghua/jsherp
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "last_affected": "3.6"
        }
    ]
}

Affected versions

v1.*
v1.0
v1.5
v2.*
v2.0
v2.1
v2.3
v2.3.1
v3.*
v3.0
v3.1
v3.2
v3.3
v3.5
v3.6

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-1588.json"