2026-02-22 14:2CVE-2026-2953VulDB
PUBLISHED5.2ApplicationCWE-22

Dromara UJCMS Template WebFileTemplateController.delete deleteDirectory path traversal

A vulnerability has been found in Dromara UJCMS 101.2. This issue affects the function deleteDirectory of the file WebFileTemplateController.delete of the component Template Handler. Such manipulation leads to path traversal. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Problem type

Affected products

Dromara

UJCMS

101.2 - AFFECTED

References

GitHub Security Advisories

GHSA-5qxq-p7xm-75w5

A vulnerability has been found in Dromara UJCMS 101.2. This issue affects the function...

https://github.com/advisories/GHSA-5qxq-p7xm-75w5

A vulnerability has been found in Dromara UJCMS 101.2. This issue affects the function deleteDirectory of the file WebFileTemplateController.delete of the component Template Handler. Such manipulation leads to path traversal. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

JSON source

https://cveawg.mitre.org/api/cve/CVE-2026-2953
Click to expand
{
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "cveMetadata": {
    "cveId": "CVE-2026-2953",
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "dateUpdated": "2026-02-22T14:02:15.375Z",
    "dateReserved": "2026-02-21T21:11:08.662Z",
    "datePublished": "2026-02-22T14:02:15.375Z",
    "state": "PUBLISHED"
  },
  "containers": {
    "cna": {
      "providerMetadata": {
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB",
        "dateUpdated": "2026-02-22T14:02:15.375Z"
      },
      "title": "Dromara UJCMS Template WebFileTemplateController.delete deleteDirectory path traversal",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability has been found in Dromara UJCMS 101.2. This issue affects the function deleteDirectory of the file WebFileTemplateController.delete of the component Template Handler. Such manipulation leads to path traversal. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        }
      ],
      "affected": [
        {
          "vendor": "Dromara",
          "product": "UJCMS",
          "cpes": [
            "cpe:2.3:a:ujcms:ujcms:*:*:*:*:*:*:*:*"
          ],
          "modules": [
            "Template Handler"
          ],
          "versions": [
            {
              "version": "101.2",
              "status": "affected"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "Path Traversal",
              "cweId": "CWE-22",
              "type": "CWE"
            }
          ]
        }
      ],
      "references": [
        {
          "url": "https://vuldb.com/?id.347319",
          "name": "VDB-347319 | Dromara UJCMS Template WebFileTemplateController.delete deleteDirectory path traversal",
          "tags": [
            "vdb-entry",
            "technical-description"
          ]
        },
        {
          "url": "https://vuldb.com/?ctiid.347319",
          "name": "VDB-347319 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "tags": [
            "signature",
            "permissions-required"
          ]
        },
        {
          "url": "https://vuldb.com/?submit.755215",
          "name": "Submit #755215 | ujcms 101.2 Recursive Deletion of Template Storage",
          "tags": [
            "third-party-advisory"
          ]
        },
        {
          "url": "https://www.yuque.com/la12138/pa2fpb/lxngf3d07uyd0nwp?singleDoc",
          "tags": [
            "exploit"
          ]
        }
      ],
      "metrics": [
        {},
        {
          "cvssV3_1": {
            "version": "3.1",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:P/RL:X/RC:R",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM"
          }
        },
        {
          "cvssV3_0": {
            "version": "3.0",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:P/RL:X/RC:R",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM"
          }
        },
        {
          "cvssV2_0": {
            "version": "2.0",
            "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P/E:POC/RL:ND/RC:UR",
            "baseScore": 5.5
          }
        }
      ],
      "timeline": [
        {
          "time": "2026-02-21T00:00:00.000Z",
          "lang": "en",
          "value": "Advisory disclosed"
        },
        {
          "time": "2026-02-21T01:00:00.000Z",
          "lang": "en",
          "value": "VulDB entry created"
        },
        {
          "time": "2026-02-21T22:16:20.000Z",
          "lang": "en",
          "value": "VulDB entry last update"
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Saul1213 (VulDB User)",
          "type": "reporter"
        }
      ]
    }
  }
}