CVE-2026-2552

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to access and potentially delete files on the server by manipulating a specific file path in the ZenTao application. It affects versions up to 21.7.8, so upgrading to version 21.7.9 is necessary to fix the issue.

Technical Description

A vulnerability was identified in ZenTao up to 21.7.8. Affected by this issue is the function delete of the file editor/control.php of the component Committer. Such manipulation of the argument filePath leads to path traversal. Upgrading to version 21.7.9 can resolve this issue. The affected component should be upgraded.

CVSS Vector Analysis

Attack VectorAdjacent Network
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeChanged

Vector String

CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$690($500-$1K)
Vendor Response
Grade APatched in 4 days

Quick Information

Published

Feb 16, 2026

about 2 months ago

Last Modified

Feb 20, 2026

about 2 months ago

Vendor

zentao

Product

zentao