CVE-2026-1810

A vulnerability was detected in bolo-blog bolo-solo up to 2.6.4. The impacted element is the function unpackFilteredZip of the file src/main/java/org/b3log/solo/bolo/prop/BackupService.java of the component ZIP File Handler. Performing a manipulation of the argument File results in path traversal. The attack is possible to be carried out remotely. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
References
Link Resource
https://github.com/bolo-blog/bolo-solo/ Product
https://github.com/bolo-blog/bolo-solo/issues/326 Exploit Issue Tracking Vendor Advisory
https://vuldb.com/?ctiid.343978 Permissions Required VDB Entry
https://vuldb.com/?id.343978 Third Party Advisory VDB Entry
https://vuldb.com/?submit.742422 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:adlered:bolo-solo:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-02-03 21:16

Updated : 2026-03-03 00:56


NVD link : CVE-2026-1810

Mitre link : CVE-2026-1810

CVE.ORG link : CVE-2026-1810


JSON object : View

Products Affected

adlered

  • bolo-solo
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')