CVE-2026-2975
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to access sensitive information from the FastApiAdmin application remotely. It affects versions up to 2.2.0 and can be exploited through a specific function in the code that handles custom documentation, making it important for users to update to a secure version.
Technical Description
A security flaw has been discovered in FastApiAdmin up to 2.2.0. Affected by this vulnerability is the function reset_api_docs of the file /backend/app/plugin/init_app.py of the component Custom Documentation Endpoint. The manipulation results in information disclosure. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 23, 2026
about 1 month ago
Last Modified
Feb 24, 2026
about 1 month ago
Vendor
fastapiadmin
Product
fastapi-admin
Related Vulnerabilities
This vulnerability allows an attacker to upload any file to the server without restrictions, which could lead to malicious files being executed. The attacker can exploit this remotely, meaning they don't need physical access to the server, and it affects versions of FastApiAdmin up to 2.2.0.
This vulnerability allows an attacker to upload any file to the FastApiAdmin system without restrictions, which could lead to malicious files being executed on the server. The attack can be carried out remotely, meaning the attacker doesn't need physical access to the system to exploit this weakness.
This vulnerability allows an attacker to upload any file to the FastApiAdmin application, which could lead to malicious files being executed on the server. The issue affects versions up to 2.2.0 and can be exploited remotely without needing special access.
This vulnerability allows an attacker to remotely access sensitive information from the FastApiAdmin application by manipulating a specific file path in the download function. It affects versions up to 2.2.0, and the method to exploit this weakness is publicly available, making it easier for attackers to carry out their attacks.