{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-2952","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-02-21T21:06:08.458Z","datePublished":"2026-02-22T14:02:07.972Z","dateUpdated":"2026-02-25T16:03:54.932Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-22T14:02:07.972Z"},"title":"Vaelsys HTTP POST Request tree_server.php os command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-78","lang":"en","description":"OS Command Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-77","lang":"en","description":"Command Injection"}]}],"affected":[{"vendor":"n/a","product":"Vaelsys","versions":[{"version":"4.1.0","status":"affected"}],"cpes":["cpe:2.3:a:vaelsys:vaelsys:*:*:*:*:*:*:*:*"],"modules":["HTTP POST Request Handler"]}],"descriptions":[{"lang":"en","value":"A flaw has been found in Vaelsys 4.1.0. This vulnerability affects unknown code of the file /tree/tree_server.php of the component HTTP POST Request Handler. This manipulation of the argument xajaxargs causes os command injection. The attack is possible to be carried out remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":7.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-02-21T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-02-21T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-02-21T22:11:14.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"CW.Wong (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.347318","name":"VDB-347318 | Vaelsys HTTP POST Request tree_server.php os command injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.347318","name":"VDB-347318 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.755166","name":"Submit #755166 | Vaelsys Vaelsys V4 4.1.0 Command Injection / Remote Code Execution","tags":["third-party-advisory"]},{"url":"https://github.com/CVE-Hunter-Leo/CVE/issues/10","tags":["exploit","issue-tracking"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-25T16:03:39.143696Z","id":"CVE-2026-2952","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-25T16:03:54.932Z"}}]}}