Description
A vulnerability has been found in Sanluan PublicCMS up to 5.202506.d. This impacts the function Save of the file com/publiccms/controller/admin/sys/TaskTemplateAdminController.java of the component Task Template Management Handler. Such manipulation of the argument path leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Problem types
Product status
5.202506.b
5.202506.c
5.202506.d
Timeline
| 2026-01-17: | Advisory disclosed |
| 2026-01-17: | VulDB entry created |
| 2026-02-05: | VulDB entry last update |
Credits
Ana10gy (VulDB User)
References
github.com/AnalogyC0de/public_exp/issues/2
vuldb.com/?id.341703 (VDB-341703 | Sanluan PublicCMS Task Template Management TaskTemplateAdminController.java save path traversal)
vuldb.com/?ctiid.341703 (VDB-341703 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.732726 (Submit #732726 | publiccms PublicCMS <= V5.202506.d Remote Code Execution (RCE))
github.com/AnalogyC0de/public_exp/issues/2