CVE-2026-2976
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to remotely access sensitive information from the FastApiAdmin application by manipulating a specific file path in the download function. It affects versions up to 2.2.0, and the method to exploit this weakness is publicly available, making it easier for attackers to carry out their attacks.
Technical Description
A weakness has been identified in FastApiAdmin up to 2.2.0. Affected by this issue is the function download_controller of the file /backend/app/api/v1/module_common/file/controller.py of the component Download Endpoint. This manipulation of the argument file_path causes information disclosure. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 23, 2026
about 1 month ago
Last Modified
Feb 24, 2026
about 1 month ago
Vendor
fastapiadmin
Product
fastapi-admin
Related Vulnerabilities
This vulnerability allows an attacker to upload any file to the server without restrictions, which could lead to malicious files being executed. The attacker can exploit this remotely, meaning they don't need physical access to the server, and it affects versions of FastApiAdmin up to 2.2.0.
This vulnerability allows an attacker to upload any file to the FastApiAdmin system without restrictions, which could lead to malicious files being executed on the server. The attack can be carried out remotely, meaning the attacker doesn't need physical access to the system to exploit this weakness.
This vulnerability allows an attacker to upload any file to the FastApiAdmin application, which could lead to malicious files being executed on the server. The issue affects versions up to 2.2.0 and can be exploited remotely without needing special access.
This vulnerability allows an attacker to access sensitive information from the FastApiAdmin application remotely. It affects versions up to 2.2.0 and can be exploited through a specific function in the code that handles custom documentation, making it important for users to update to a secure version.