CVE-2026-22786

Source
https://cve.org/CVERecord?id=CVE-2026-22786
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-22786.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-22786
Aliases
Published
2026-01-12T21:09:01.732Z
Modified
2026-01-23T02:56:09.657518Z
Severity
  • 7.3 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P CVSS Calculator
Summary
Gin-vue-admin has arbitrary file upload vulnerability caused by path traversal
Details

Gin-vue-admin is a backstage management system based on vue and gin. Gin-vue-admin <= v2.8.7 has a path traversal vulnerability in the breakpoint resume upload functionality. Attacker can upload any files on any directory. In the breakpoint_continue.go file, the MakeFile function accepts a fileName parameter through the /fileUploadAndDownload/breakpointContinueFinish API endpoint and directly concatenates it with the base directory path (./fileDir/) using os.OpenFile() without any validation for directory traversal sequences (e.g., ../). An attacker with file upload privileges could exploit this vulnerability.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-22",
        "CWE-434"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/22xxx/CVE-2026-22786.json"
}
References

Affected packages

Git / github.com/flipped-aurora/gin-vue-admin

Affected ranges

Type
GIT
Repo
https://github.com/flipped-aurora/gin-vue-admin
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

V2.*
V2.3.1
V2.3.7
V2.4.4
V2.5.0b
v.*
v.2.3.41
v0.*
v0.9.0
v2.*
v2.0.0
v2.0.2
v2.0.3
v2.0.4
v2.1.0
v2.2.0
v2.3.0
v2.3.3
v2.3.31
v2.3.4
v2.3.5
v2.3.6
v2.3.8
v2.3.9
v2.4.0
v2.4.1
v2.4.2
v2.4.3
v2.4.4
v2.4.4-1
v2.4.5
v2.4.5Beta
v2.4.5RC
v2.4.6
v2.5.0
v2.5.0a
v2.5.1
v2.5.1b
v2.5.2
v2.5.3
v2.5.3b
v2.5.3beta
v2.5.4
v2.5.5
v2.5.6
v2.5.6-a
v2.5.7
v2.5.7-a
v2.5.8
v2.5.9
v2.5.9a
v2.6.0
v2.6.1
v2.6.2
v2.6.3
v2.6.4
v2.6.4-a
v2.6.5
v2.6.6
v2.6.7
v2.7.0
v2.7.1
v2.7.2
v2.7.3
v2.7.4
v2.7.5
v2.7.6
v2.7.7
v2.7.9
v2.8.0
v2.8.1
v2.8.2
v2.8.2-a
v2.8.3
v2.8.4
v2.8.5
v2.8.6
v2.8.7

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-22786.json"