A vulnerability was found in jishenghua jshERP up to 3.6. The impacted element is the function install of the file /jshERP-boot/plugin/installByPath of the component com.gitee.starblues.integration.operator.DefaultPluginOperator. The manipulation of the argument path results in path traversal. It is possible to launch the attack remotely. The exploit has been made public and could be used. The project was informed of the problem early through an issue report but has not responded yet.
References
| Link | Resource |
|---|---|
| https://github.com/jishenghua/jshERP/ | Product |
| https://github.com/jishenghua/jshERP/issues/147 | Exploit Issue Tracking Vendor Advisory |
| https://vuldb.com/?ctiid.343351 | Permissions Required VDB Entry |
| https://vuldb.com/?id.343351 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.740649 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2026-01-29 14:16
Updated : 2026-02-13 20:43
NVD link : CVE-2026-1588
Mitre link : CVE-2026-1588
CVE.ORG link : CVE-2026-1588
JSON object : View
Products Affected
jishenghua
- jsherp
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
