Home

Description

xiaoheiFS is a self-hosted financial and operational system for cloud service businesses. In versions up to and including 0.3.15, the standard plugin system allows admins to upload a ZIP file containing a binary and a `manifest.json`. The server trusts the `binaries` field in the manifest and executes the specified file without any validation of its contents or behavior, leading to Remote Code Execution (RCE). Version 0.4.0 fixes the issue.

PUBLISHED Reserved 2026-03-02 | Published 2026-03-18 | Updated 2026-03-18 | Assigner GitHub_M




HIGH: 7.2CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

CWE-434: Unrestricted Upload of File with Dangerous Type

Product status

< 0.4.0
affected

References

github.com/...oheiFS/security/advisories/GHSA-4vw4-5wmh-7x4v exploit

github.com/...oheiFS/security/advisories/GHSA-4vw4-5wmh-7x4v

cve.org (CVE-2026-28673)

nvd.nist.gov (CVE-2026-28673)

Download JSON