A flaw has been found in rawchen sims up to 004f783b1db5ecdfad81c8fdc3b34171211112de. Affected by this issue is some unknown functionality of the file sims-master/src/web/servlet/file/DeleteFileServlet.java of the component deleteFileServlet Endpoint. Executing a manipulation of the argument filename can lead to path traversal. The attack can be launched remotely. The exploit has been published and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The vendor was contacted early about this disclosure but did not respond in any way.
rawchen sims deleteFileServlet Endpoint DeleteFileServlet.java path traversal
Problem type
Affected products
rawchen
004f783b1db5ecdfad81c8fdc3b34171211112de - AFFECTED
References
https://vuldb.com/vuln/359603
https://vuldb.com/vuln/359603/cti
https://vuldb.com/submit/797682
https://github.com/yingxiujie/cve/issues/2
GitHub Security Advisories
GHSA-jp67-94wj-5j6r
A flaw has been found in rawchen sims up to 004f783b1db5ecdfad81c8fdc3b34171211112de. Affected by...
https://github.com/advisories/GHSA-jp67-94wj-5j6rA flaw has been found in rawchen sims up to 004f783b1db5ecdfad81c8fdc3b34171211112de. Affected by this issue is some unknown functionality of the file sims-master/src/web/servlet/file/DeleteFileServlet.java of the component deleteFileServlet Endpoint. Executing a manipulation of the argument filename can lead to path traversal. The attack can be launched remotely. The exploit has been published and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The vendor was contacted early about this disclosure but did not respond in any way.
JSON source
https://cveawg.mitre.org/api/cve/CVE-2026-7024Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2026-7024",
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"dateUpdated": "2026-04-26T06:45:11.009Z",
"dateReserved": "2026-04-25T14:05:37.645Z",
"datePublished": "2026-04-26T06:45:11.009Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB",
"dateUpdated": "2026-04-26T06:45:11.009Z"
},
"title": "rawchen sims deleteFileServlet Endpoint DeleteFileServlet.java path traversal",
"descriptions": [
{
"lang": "en",
"value": "A flaw has been found in rawchen sims up to 004f783b1db5ecdfad81c8fdc3b34171211112de. Affected by this issue is some unknown functionality of the file sims-master/src/web/servlet/file/DeleteFileServlet.java of the component deleteFileServlet Endpoint. Executing a manipulation of the argument filename can lead to path traversal. The attack can be launched remotely. The exploit has been published and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"affected": [
{
"vendor": "rawchen",
"product": "sims",
"modules": [
"deleteFileServlet Endpoint"
],
"versions": [
{
"version": "004f783b1db5ecdfad81c8fdc3b34171211112de",
"status": "affected"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "Path Traversal",
"cweId": "CWE-22",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://vuldb.com/vuln/359603",
"name": "VDB-359603 | rawchen sims deleteFileServlet Endpoint DeleteFileServlet.java path traversal",
"tags": [
"vdb-entry",
"technical-description"
]
},
{
"url": "https://vuldb.com/vuln/359603/cti",
"name": "VDB-359603 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required"
]
},
{
"url": "https://vuldb.com/submit/797682",
"name": "Submit #797682 | sims Latest Unauthorized Arbitrary File Delete Vulnerability",
"tags": [
"third-party-advisory"
]
},
{
"url": "https://github.com/yingxiujie/cve/issues/2",
"tags": [
"exploit",
"issue-tracking"
]
}
],
"metrics": [
{},
{
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:P/RL:X/RC:R",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
}
},
{
"cvssV3_0": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:P/RL:X/RC:R",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
}
},
{
"cvssV2_0": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P/E:POC/RL:ND/RC:UR",
"baseScore": 5.5
}
}
],
"timeline": [
{
"time": "2026-04-25T00:00:00.000Z",
"lang": "en",
"value": "Advisory disclosed"
},
{
"time": "2026-04-25T02:00:00.000Z",
"lang": "en",
"value": "VulDB entry created"
},
{
"time": "2026-04-25T16:10:44.000Z",
"lang": "en",
"value": "VulDB entry last update"
}
],
"credits": [
{
"lang": "en",
"value": "yingxiujie (VulDB User)",
"type": "reporter"
},
{
"lang": "en",
"value": "VulDB CNA Team",
"type": "coordinator"
}
]
}
}
}