CVE-2026-1588

LOW

Jishenghua Jsherp < 3.6 - Path Traversal

Title source: rule
STIX 2.1

Description

A vulnerability was found in jishenghua jshERP up to 3.6. The impacted element is the function install of the file /jshERP-boot/plugin/installByPath of the component com.gitee.starblues.integration.operator.DefaultPluginOperator. The manipulation of the argument path results in path traversal. It is possible to launch the attack remotely. The exploit has been made public and could be used. The project was informed of the problem early through an issue report but has not responded yet.

References (5)

Core 5
Core References
Third Party Advisory, VDB Entry vdb-entry technical-description
https://vuldb.com/?id.343351
Permissions Required, VDB Entry signature permissions-required
https://vuldb.com/?ctiid.343351
Third Party Advisory, VDB Entry third-party-advisory
https://vuldb.com/?submit.740649
Exploit, Issue Tracking, Vendor Advisory exploit issue-tracking
https://github.com/jishenghua/jshERP/issues/147

Scores

CVSS v3 2.7
EPSS 0.0008
EPSS Percentile 22.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-22
Status published
Products (1)
jishenghua/jsherp < 3.6
Published Jan 29, 2026
Tracked Since Feb 18, 2026