{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-7490","assignerOrgId":"cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e","state":"PUBLISHED","assignerShortName":"twcert","dateReserved":"2026-04-30T09:01:05.760Z","datePublished":"2026-05-02T09:06:25.153Z","dateUpdated":"2026-05-02T09:06:25.153Z"},"containers":{"cna":{"providerMetadata":{"orgId":"cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e","shortName":"twcert","dateUpdated":"2026-05-02T09:06:25.153Z"},"title":"Sunnet｜CTMS and CPAS - Arbitrary File Upload","datePublic":"2026-05-02T09:02:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-434","description":"CWE-434 Unrestricted upload of file with dangerous type","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-650","descriptions":[{"lang":"en","value":"CAPEC-650 Upload a Web Shell to a Web Server"}]}],"affected":[{"vendor":"Sunnet","product":"CTMS","versions":[{"status":"affected","version":"0"}],"defaultStatus":"unaffected"},{"vendor":"Sunnet","product":"CPAS","versions":[{"status":"affected","version":"0"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"CTMS and CPAS developed by Sunnet has an Arbitrary File Upload vulnerability, allowing privileged remote attackers to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server.","supportingMedia":[{"type":"text/html","base64":false,"value":"CTMS and CPAS developed by Sunnet has an Arbitrary File Upload vulnerability, allowing privileged remote attackers to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server."}]}],"references":[{"url":"https://www.twcert.org.tw/tw/cp-132-10894-1ac1f-1.html","tags":["third-party-advisory"]},{"url":"https://www.twcert.org.tw/en/cp-139-10895-25ca1-2.html","tags":["third-party-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"HIGH","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED","version":"4.0","baseSeverity":"HIGH","baseScore":8.6,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"}},{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseSeverity":"HIGH","baseScore":7.2,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}}],"solutions":[{"lang":"en","value":"The vendor should have issued a patch. If not yet received, please reach out to the vendor directly.","supportingMedia":[{"type":"text/html","base64":false,"value":"The vendor should have issued a patch. If not yet received, please reach out to the vendor directly."}]}],"source":{"advisory":"TVN-202604012","discovery":"EXTERNAL"},"x_generator":{"engine":"Vulnogram 1.0.2"}}}}