{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-2683","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-02-18T13:36:29.062Z","datePublished":"2026-02-18T23:02:06.726Z","dateUpdated":"2026-02-23T10:26:06.323Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-23T10:26:06.323Z"},"title":"Tsinghua Unigroup Electronic Archives System downLoad.html path traversal","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-22","lang":"en","description":"Path Traversal"}]}],"affected":[{"vendor":"Tsinghua Unigroup","product":"Electronic Archives System","versions":[{"version":"3.2.210802(62532)","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in Tsinghua Unigroup Electronic Archives System 3.2.210802(62532). The affected element is an unknown function of the file /Using/Subject/downLoad.html. Performing a manipulation of the argument path results in path traversal. The attack may be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":4.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:P/I:N/A:N/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-02-18T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-02-18T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-02-18T14:41:36.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"lanmeik (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.346474","name":"VDB-346474 | Tsinghua Unigroup Electronic Archives System downLoad.html path traversal","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.346474","name":"VDB-346474 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.753418","name":"Submit #753418 | Tsinghua Unigroup Electronic Archives System 3.2.210802(62532)  File and Directory Information Exposure","tags":["third-party-advisory"]},{"url":"https://github.com/luoye197-prog/cve-ziguang-fileread3/blob/main/introduce","tags":["broken-link"]},{"url":"https://github.com/luoye197-prog/cve-ziguang-fileread3/blob/main/poc.py","tags":["broken-link","exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-19T16:43:16.164202Z","id":"CVE-2026-2683","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-19T16:44:32.076Z"}}]}}