Home

Description

WebErpMesv2 is a Resource Management and Manufacturing execution system Web for industry. Prior to 1.19, WebErpMesv2 contains a file upload validation bypass vulnerability in multiple controllers that allows authenticated users to upload arbitrary files, including PHP scripts, leading to Remote Code Execution (RCE). This vulnerability is identical in nature to CVE-2025-52130 but exists in different code locations that were not addressed by the original fix. This vulnerability is fixed in 1.19.

PUBLISHED Reserved 2026-01-09 | Published 2026-01-12 | Updated 2026-01-13 | Assigner GitHub_M




MEDIUM: 5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

Problem types

CWE-434: Unrestricted Upload of File with Dangerous Type

CWE-616: Incomplete Identification of Uploaded File Variables (PHP)

Product status

< 1.19
affected

References

github.com/...pMesv2/security/advisories/GHSA-64rv-f829-x6m4 exploit

github.com/...pMesv2/security/advisories/GHSA-64rv-f829-x6m4

github.com/...ommit/c9e7f4a85aeb774a0ea4b61ad57a51b941166b69

cve.org (CVE-2026-22789)

nvd.nist.gov (CVE-2026-22789)

Download JSON