{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-2898","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-02-20T18:56:52.541Z","datePublished":"2026-02-22T00:02:10.909Z","dateUpdated":"2026-02-23T19:17:18.513Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-22T00:02:10.909Z"},"title":"funadmin Backend Endpoint AuthCloudService.php getMember deserialization","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-502","lang":"en","description":"Deserialization"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-20","lang":"en","description":"Improper Input Validation"}]}],"affected":[{"vendor":"n/a","product":"funadmin","versions":[{"version":"7.1.0-rc1","status":"affected"},{"version":"7.1.0-rc2","status":"affected"},{"version":"7.1.0-rc3","status":"affected"},{"version":"7.1.0-rc4","status":"affected"}],"cpes":["cpe:2.3:a:funadmin:funadmin:*:*:*:*:*:*:*:*"],"modules":["Backend Endpoint"]}],"descriptions":[{"lang":"en","value":"A vulnerability was detected in funadmin up to 7.1.0-rc4. This issue affects the function getMember of the file app/common/service/AuthCloudService.php of the component Backend Endpoint. The manipulation of the argument cloud_account results in deserialization. The attack may be performed from remote. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":5.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.5,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-02-20T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-02-20T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-02-20T20:02:04.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"I4m6da (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.347209","name":"VDB-347209 | funadmin Backend Endpoint AuthCloudService.php getMember deserialization","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.347209","name":"VDB-347209 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.753976","name":"Submit #753976 | funadmin v7.1.0-rc4 Deserialization of Untrusted Data","tags":["third-party-advisory"]},{"url":"https://github.com/I4m6da/CVE/issues/5","tags":["issue-tracking"]},{"url":"https://github.com/I4m6da/CVE/issues/5#issue-3890444166","tags":["exploit","issue-tracking"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-23T19:15:34.971727Z","id":"CVE-2026-2898","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-23T19:17:18.513Z"}}]}}