CVE-2026-1549

MEDIUM

Jishenghua Jsherp < 3.6 - Path Traversal

Title source: rule
STIX 2.1

Description

A vulnerability was identified in jishenghua jshERP up to 3.6. Affected by this vulnerability is an unknown functionality of the file /jshERP-boot/plugin/uploadPluginConfigFile of the component PluginController. Such manipulation of the argument configFile leads to path traversal. The attack may be launched remotely. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.

References (6)

Core 6
Core References
Third Party Advisory, VDB Entry vdb-entry technical-description
https://vuldb.com/?id.343245
Permissions Required, VDB Entry signature permissions-required
https://vuldb.com/?ctiid.343245
Third Party Advisory, VDB Entry third-party-advisory
https://vuldb.com/?submit.739805
Exploit, Issue Tracking issue-tracking
https://github.com/jishenghua/jshERP/issues/146
Exploit, Issue Tracking exploit issue-tracking
https://github.com/jishenghua/jshERP/issues/146#issue-3817997461

Scores

CVSS v3 4.3
EPSS 0.0002
EPSS Percentile 5.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-22
Status published
Products (1)
jishenghua/jsherp < 3.6
Published Jan 28, 2026
Tracked Since Feb 18, 2026