{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-27895","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-02-24T15:19:29.717Z","datePublished":"2026-03-17T23:51:26.501Z","dateUpdated":"2026-03-18T19:55:14.059Z"},"containers":{"cna":{"title":"LAM has incorrect regular expression in PDF export component that allows user to upload files of any type","problemTypes":[{"descriptions":[{"cweId":"CWE-185","lang":"en","description":"CWE-185: Incorrect Regular Expression","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.3,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/LDAPAccountManager/lam/security/advisories/GHSA-88hf-2cjm-m9g8","tags":["x_refsource_CONFIRM"],"url":"https://github.com/LDAPAccountManager/lam/security/advisories/GHSA-88hf-2cjm-m9g8"},{"name":"https://github.com/LDAPAccountManager/lam/security/advisories/GHSA-w7xq-vjr3-p9cf","tags":["x_refsource_MISC"],"url":"https://github.com/LDAPAccountManager/lam/security/advisories/GHSA-w7xq-vjr3-p9cf"},{"name":"https://github.com/LDAPAccountManager/lam/releases/tag/9.5","tags":["x_refsource_MISC"],"url":"https://github.com/LDAPAccountManager/lam/releases/tag/9.5"}],"affected":[{"vendor":"LDAPAccountManager","product":"lam","versions":[{"version":"< 9.5","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-03-17T23:51:26.501Z"},"descriptions":[{"lang":"en","value":"LDAP Account Manager (LAM) is a webfrontend for managing entries (e.g. users, groups, DHCP settings) stored in an LDAP directory. Prior to version 9.5, the PDF export component does not correctly validate uploaded file extensions. This way any file type (including .php files) can be uploaded. With GHSA-w7xq-vjr3-p9cf, an attacker can achieve remote code execution as the web server user. Version 9.5 fixes the issue. Although upgrading is recommended, a workaround would be to make /var/lib/ldap-account-manager/config read-only for the web-server user."}],"source":{"advisory":"GHSA-88hf-2cjm-m9g8","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-18T19:55:04.254873Z","id":"CVE-2026-27895","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-18T19:55:14.059Z"}}]}}