Home

Description

A vulnerability was determined in ZenTao up to 21.7.8. Affected by this vulnerability is the function delete of the file editor/control.php of the component Backup Handler. This manipulation of the argument fileName causes path traversal. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.

PUBLISHED Reserved 2026-02-15 | Published 2026-02-16 | Updated 2026-02-23 | Assigner VulDB




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
MEDIUM: 5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:P/RL:X/RC:R
MEDIUM: 5.4CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:P/RL:X/RC:R
5.5AV:N/AC:L/Au:S/C:N/I:P/A:P/E:POC/RL:ND/RC:UR

Problem types

Path Traversal

Timeline

2026-02-15:Advisory disclosed
2026-02-15:VulDB entry created
2026-02-20:VulDB entry last update

Credits

ez-lbz (VulDB User) reporter

References

vuldb.com/?id.346160 (VDB-346160 | ZenTao Backup control.php delete path traversal) vdb-entry technical-description

vuldb.com/?ctiid.346160 (VDB-346160 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/?submit.749983 (Submit #749983 | Zentao PMS <=21.7.8 Arbitrary File Deletion) third-party-advisory

github.com/ez-lbz/ez-lbz.github.io/issues/10 exploit issue-tracking

cve.org (CVE-2026-2551)

nvd.nist.gov (CVE-2026-2551)

Download JSON