{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-1812","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-02-03T14:03:56.109Z","datePublished":"2026-02-03T22:32:08.158Z","dateUpdated":"2026-02-23T09:15:58.665Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-23T09:15:58.665Z"},"title":"bolo-blog bolo-solo Filename BackupService.java importFromCnblogs path traversal","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-22","lang":"en","description":"Path Traversal"}]}],"affected":[{"vendor":"bolo-blog","product":"bolo-solo","versions":[{"version":"2.6.0","status":"affected"},{"version":"2.6.1","status":"affected"},{"version":"2.6.2","status":"affected"},{"version":"2.6.3","status":"affected"},{"version":"2.6.4","status":"affected"}],"modules":["Filename Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in bolo-blog bolo-solo up to 2.6.4. This impacts the function importFromCnblogs of the file src/main/java/org/b3log/solo/bolo/prop/BackupService.java of the component Filename Handler. The manipulation of the argument File leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-02-03T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-02-03T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-02-05T12:20:14.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"MaoQiu (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.343980","name":"VDB-343980 | bolo-blog bolo-solo Filename BackupService.java importFromCnblogs path traversal","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.343980","name":"VDB-343980 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.742582","name":"Submit #742582 | https://github.com/bolo-blog/bolo-solo bolo-solo V2.6.4 Arbitrary file write","tags":["third-party-advisory"]},{"url":"https://github.com/bolo-blog/bolo-solo/issues/328","tags":["exploit","issue-tracking"]},{"url":"https://github.com/bolo-blog/bolo-solo/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-04T14:30:05.397092Z","id":"CVE-2026-1812","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-04T14:31:02.355Z"}}]}}