{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-7024","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-04-25T14:05:37.645Z","datePublished":"2026-04-26T06:45:11.009Z","dateUpdated":"2026-04-26T06:45:11.009Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-04-26T06:45:11.009Z"},"title":"rawchen sims deleteFileServlet Endpoint DeleteFileServlet.java path traversal","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-22","lang":"en","description":"Path Traversal"}]}],"affected":[{"vendor":"rawchen","product":"sims","versions":[{"version":"004f783b1db5ecdfad81c8fdc3b34171211112de","status":"affected"}],"modules":["deleteFileServlet Endpoint"]}],"descriptions":[{"lang":"en","value":"A flaw has been found in rawchen sims up to 004f783b1db5ecdfad81c8fdc3b34171211112de. Affected by this issue is some unknown functionality of the file sims-master/src/web/servlet/file/DeleteFileServlet.java of the component deleteFileServlet Endpoint. Executing a manipulation of the argument filename can lead to path traversal. The attack can be launched remotely. The exploit has been published and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":5.4,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.4,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.5,"vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-04-25T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-04-25T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-04-25T16:10:44.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"yingxiujie (VulDB User)","type":"reporter"},{"lang":"en","value":"VulDB CNA Team","type":"coordinator"}],"references":[{"url":"https://vuldb.com/vuln/359603","name":"VDB-359603 | rawchen sims deleteFileServlet Endpoint DeleteFileServlet.java path traversal","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/vuln/359603/cti","name":"VDB-359603 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/submit/797682","name":"Submit #797682 | sims Latest Unauthorized Arbitrary File Delete Vulnerability","tags":["third-party-advisory"]},{"url":"https://github.com/yingxiujie/cve/issues/2","tags":["exploit","issue-tracking"]}]}}}