{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-3813","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-03-08T16:31:04.148Z","datePublished":"2026-03-09T09:32:14.891Z","dateUpdated":"2026-03-10T16:01:34.157Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-03-09T09:32:14.891Z"},"title":"opencc JFlow WF_CCForm.java Calculate injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-707","lang":"en","description":"Improper Neutralization"}]}],"affected":[{"vendor":"opencc","product":"JFlow","versions":[{"version":"5badc00db382d7cb82dad231e6a866b18e0addfe","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was identified in opencc JFlow up to 5badc00db382d7cb82dad231e6a866b18e0addfe. Affected by this vulnerability is the function Calculate of the file src/main/java/bp/wf/httphandler/WF_CCForm.java. Such manipulation leads to injection. The attack may be performed from remote. The exploit is publicly available and might be used. This product utilizes a rolling release system for continuous delivery, and as such, version information for affected or updated releases is not disclosed. The project was informed of the problem early through an issue report but has not responded yet."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-03-08T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-03-08T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-03-08T17:36:11.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"MaoQiu (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.349779","name":"VDB-349779 | opencc JFlow WF_CCForm.java Calculate injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.349779","name":"VDB-349779 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.769112","name":"Submit #769112 | https://gitee.com/opencc/JFlow JFlow latest version Remote Code Execution","tags":["third-party-advisory"]},{"url":"https://gitee.com/opencc/JFlow/issues/IE8R2F","tags":["exploit","issue-tracking"]},{"url":"https://gitee.com/opencc/JFlow/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-10T16:01:26.877522Z","id":"CVE-2026-3813","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-10T16:01:34.157Z"}}]}}