CVE-2026-2878

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to tamper with uploaded files by exploiting a predictable temporary identifier used in the file upload process. It mainly affects versions of Telerik UI for AJAX before 2026.1.225, where the attacker needs to know the timestamp and filename to create a conflicting upload.

Technical Description

In Progress® Telerik® UI for AJAX, versions prior to 2026.1.225, an insufficient entropy vulnerability exists in RadAsyncUpload, where a predictable temporary identifier, based on timestamp and filename, can enable collisions and file content tampering.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactNone
Integrity ImpactHigh
Availability ImpactNone
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$828($500-$1K)
Vendor Response
Grade APatched in 1 day

Quick Information

Published

Feb 25, 2026

about 1 month ago

Last Modified

Feb 26, 2026

about 1 month ago

Vendor

progress

Product

telerik ui for asp.net ajax