CVE-2026-2978
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to upload any file to the FastApiAdmin system without restrictions, which could lead to malicious files being executed on the server. The attack can be carried out remotely, meaning the attacker doesn't need physical access to the system to exploit this weakness.
Technical Description
A vulnerability was detected in FastApiAdmin up to 2.2.0. This vulnerability affects the function upload_file_controller of the file /backend/app/api/v1/module_system/params/controller.py of the component Scheduled Task API. Performing a manipulation results in unrestricted upload. The attack can be initiated remotely. The exploit is now public and may be used.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 23, 2026
about 1 month ago
Last Modified
Feb 25, 2026
about 1 month ago
Vendor
fastapiadmin
Product
fastapi-admin
Related Vulnerabilities
This vulnerability allows an attacker to upload any file to the server without restrictions, which could lead to malicious files being executed. The attacker can exploit this remotely, meaning they don't need physical access to the server, and it affects versions of FastApiAdmin up to 2.2.0.
This vulnerability allows an attacker to upload any file to the FastApiAdmin application, which could lead to malicious files being executed on the server. The issue affects versions up to 2.2.0 and can be exploited remotely without needing special access.
This vulnerability allows an attacker to remotely access sensitive information from the FastApiAdmin application by manipulating a specific file path in the download function. It affects versions up to 2.2.0, and the method to exploit this weakness is publicly available, making it easier for attackers to carry out their attacks.
This vulnerability allows an attacker to access sensitive information from the FastApiAdmin application remotely. It affects versions up to 2.2.0 and can be exploited through a specific function in the code that handles custom documentation, making it important for users to update to a secure version.