CVE-2026-26682
High
|7.8Exploit Available
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows a local attacker to run any code they want on the system using the fastCMS software, which could lead to complete control over the affected machine. To exploit this, the attacker must have local access to the system and be able to interact with the PluginController.java component.
Technical Description
An issue in fastCMS before v.0.1.6 allows a local attacker to execute arbitrary code via the PluginController.java component
CVSS Vector Analysis
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeUnchanged
Vector String
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Est. Bounty
$2,684($1K-$5K)
Vendor Response
Grade APatched in 5 days
Quick Information
Published
Feb 26, 2026
about 1 month ago
Last Modified
Mar 3, 2026
about 1 month ago
Vendor
xjd2020
Product
fastcms