CVE-2026-36760
JeeSite · JeeSite
Authenticated attackers with file upload permissions can exploit a path traversal vulnerability in JeeSite v5.15.1 to upload arbitrary files to the filesystem.
Executive summary
A high-severity path traversal vulnerability in JeeSite allows authenticated attackers to perform unauthorized file writes, potentially leading to remote code execution.
Vulnerability
The fileMd5 parameter in the /a/file/upload endpoint fails to properly sanitize path inputs. When chunked upload is enabled, an authenticated attacker can write files to arbitrary locations on the server.
Business impact
This vulnerability carries a CVSS score of 9.6. While it requires authentication, the ability to write arbitrary files allows an attacker to upload malicious scripts (webshells) into executable directories, resulting in full server compromise, data exfiltration, or persistence within the environment.
Remediation
Immediate Action: Upgrade to the latest version of JeeSite that addresses the path traversal flaw in the file upload module.
Proactive Monitoring: Audit the filesystem for unexpected files in upload directories and monitor logs for unusual file upload activity or traversal attempts.
Compensating Controls: Restrict file upload permissions to authorized users only and implement strict validation of file paths and extensions at the application layer.
Exploitation status
Public Exploit Available: Unknown
Analyst recommendation
Organizations should prioritize updating their JeeSite instances. Furthermore, review current user roles and permissions to ensure that the principle of least privilege is enforced regarding file upload capabilities.