{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-2863","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-02-20T14:17:44.232Z","datePublished":"2026-02-21T06:02:09.608Z","dateUpdated":"2026-02-23T19:25:45.383Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-21T06:02:09.608Z"},"title":"feng_ha_ha/megagao ssm-erp/production_ssm FileServiceImpl.java deleteFile path traversal","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-22","lang":"en","description":"Path Traversal"}]}],"affected":[{"vendor":"feng_ha_ha","product":"ssm-erp","versions":[{"version":"4288d53bd35757b27f2d070057aefb2c07bdd097","status":"affected"}]},{"vendor":"feng_ha_ha","product":"production_ssm","versions":[{"version":"4288d53bd35757b27f2d070057aefb2c07bdd097","status":"affected"}]},{"vendor":"megagao","product":"ssm-erp","versions":[{"version":"4288d53bd35757b27f2d070057aefb2c07bdd097","status":"affected"}]},{"vendor":"megagao","product":"production_ssm","versions":[{"version":"4288d53bd35757b27f2d070057aefb2c07bdd097","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A flaw has been found in feng_ha_ha/megagao ssm-erp and production_ssm up to 4288d53bd35757b27f2d070057aefb2c07bdd097. The impacted element is the function deleteFile of the file FileServiceImpl.java. This manipulation causes path traversal. The attack can be initiated remotely. The exploit has been published and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. This product is distributed under two entirely different names. The project was informed of the problem early through an issue report but has not responded yet."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":5.4,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.4,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.5,"vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-02-20T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-02-20T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-02-20T15:22:54.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Jszdk (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.347102","name":"VDB-347102 | feng_ha_ha/megagao ssm-erp/production_ssm FileServiceImpl.java deleteFile path traversal","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.347102","name":"VDB-347102 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.754530","name":"Submit #754530 | https://github.com/megagao/production_ssm production_ssm v1.0 Arbitrary file deletion","tags":["third-party-advisory"]},{"url":"https://github.com/megagao/production_ssm/issues/37","tags":["issue-tracking"]},{"url":"https://github.com/megagao/production_ssm/issues/37#issue-3914979380","tags":["exploit","issue-tracking"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-23T19:25:17.991810Z","id":"CVE-2026-2863","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-23T19:25:45.383Z"}}]}}