{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-33273","assignerOrgId":"ede6fdc4-6654-4307-a26d-3331c018e2ce","state":"PUBLISHED","assignerShortName":"jpcert","dateReserved":"2026-04-03T04:29:18.445Z","datePublished":"2026-04-08T05:11:03.549Z","dateUpdated":"2026-04-08T15:05:25.194Z"},"containers":{"cna":{"affected":[{"vendor":"ICZ Corporation","product":"MATCHA INVOICE","versions":[{"version":"2.6.6 and earlier","status":"affected"}]}],"descriptions":[{"lang":"en","value":"Unrestricted upload of file with dangerous type issue exists in MATCHA INVOICE 2.6.6 and earlier. If this vulnerability is exploited, an arbitrary file may be created by an administrator of the product. As a result, arbitrary code may be executed on the server."}],"problemTypes":[{"descriptions":[{"description":"Unrestricted upload of file with dangerous type","lang":"en-US","cweId":"CWE-434","type":"CWE"}]}],"references":[{"url":"https://oss.icz.co.jp/news/?p=1386"},{"url":"https://jvn.jp/en/jp/JVN33581068/"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en-US","value":"GENERAL"}],"cvssV3_0":{"version":"3.0","baseSeverity":"MEDIUM","baseScore":4.7,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L"}},{"format":"CVSS","scenarios":[{"lang":"en-US","value":"GENERAL"}],"cvssV4_0":{"version":"4.0","baseSeverity":"MEDIUM","baseScore":5.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"}}],"providerMetadata":{"orgId":"ede6fdc4-6654-4307-a26d-3331c018e2ce","shortName":"jpcert","dateUpdated":"2026-04-08T05:11:03.549Z"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-08T15:05:18.489563Z","id":"CVE-2026-33273","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-08T15:05:25.194Z"}}]}}