CVE-2026-3189

Source
https://cve.org/CVERecord?id=CVE-2026-3189
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-3189.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-3189
Published
2026-02-25T17:25:42.470Z
Modified
2026-03-01T01:47:26.108091Z
Severity
  • 3.1 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
[none]
Details

A weakness has been identified in feiyuchuixue sz-boot-parent up to 1.3.2-beta. This vulnerability affects unknown code of the file /api/admin/common/files/download. Executing a manipulation of the argument url can lead to server-side request forgery. The attack can be executed remotely. Attacks of this nature are highly complex. It is stated that the exploitability is difficult. Upgrading to version 1.3.3-beta is able to resolve this issue. This patch is called aefaabfd7527188bfba3c8c9eee17c316d094802. Upgrading the affected component is advised. The project was informed beforehand and acted very professional: "We have added a URL protocol whitelist validation to the file download interface, allowing only http and https protocols."

References

Affected packages

Git / github.com/feiyuchuixue/sz-boot-parent

Affected ranges

Type
GIT
Repo
https://github.com/feiyuchuixue/sz-boot-parent
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*
v0.6.0
v0.6.1
v0.6.2
v0.6.3
v0.6.4
v0.6.5
v0.7.1
v0.7.10
v0.7.11
v0.7.2
v0.7.3
v0.7.4
v0.7.5
v0.7.6
v0.7.7
v0.7.8
v0.7.9
v0.8.0
v0.8.1
v0.8.2
v0.8.3
v0.8.4
v0.8.5
v0.8.6
v0.8.7
v0.8.8
v0.9.0
v1.*
v1.0.0-beta
v1.0.1-beta
v1.0.2-beta
v1.1.0-beta
v1.2.0-beta
v1.2.1-beta
v1.2.2-beta
v1.2.3-beta
v1.2.4-beta
v1.2.5-beta
v1.2.6-beta
v1.3.0-beta
v1.3.1-beta
v1.3.2-beta

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-3189.json"