{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-1811","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-02-03T14:03:53.481Z","datePublished":"2026-02-03T21:32:07.628Z","dateUpdated":"2026-02-23T09:15:44.878Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-23T09:15:44.878Z"},"title":"bolo-blog bolo-solo Filename BackupService.java importFromMarkdown path traversal","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-22","lang":"en","description":"Path Traversal"}]}],"affected":[{"vendor":"bolo-blog","product":"bolo-solo","versions":[{"version":"2.6.0","status":"affected"},{"version":"2.6.1","status":"affected"},{"version":"2.6.2","status":"affected"},{"version":"2.6.3","status":"affected"},{"version":"2.6.4","status":"affected"}],"modules":["Filename Handler"]}],"descriptions":[{"lang":"en","value":"A flaw has been found in bolo-blog bolo-solo up to 2.6.4. This affects the function importFromMarkdown of the file src/main/java/org/b3log/solo/bolo/prop/BackupService.java of the component Filename Handler. Executing a manipulation of the argument File can lead to path traversal. The attack may be performed from remote. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-02-03T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-02-03T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-02-05T12:20:14.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"MaoQiu (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.343979","name":"VDB-343979 | bolo-blog bolo-solo Filename BackupService.java importFromMarkdown path traversal","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.343979","name":"VDB-343979 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.742437","name":"Submit #742437 | https://github.com/bolo-blog/bolo-solo bolo-solo V2.6.4 Arbitrary File Write and Remote Code Execution","tags":["third-party-advisory"]},{"url":"https://github.com/bolo-blog/bolo-solo/issues/327","tags":["exploit","issue-tracking"]},{"url":"https://github.com/bolo-blog/bolo-solo/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-03T21:43:24.472362Z","id":"CVE-2026-1811","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-03T21:43:35.663Z"}}]}}