CVE-2026-3185
Plain English Summary
AI-powered analysis for quick understanding
An attacker can bypass authorization and access or manipulate messages that do not belong to them through a specific API endpoint. This vulnerability affects versions up to 1.3.2-beta and can be exploited remotely, so it's crucial to upgrade to version 1.3.3-beta to fix the issue.
Technical Description
A vulnerability was found in feiyuchuixue sz-boot-parent up to 1.3.2-beta. Affected is an unknown function of the file /api/admin/sys-message/ of the component API Endpoint. The manipulation of the argument messageId results in authorization bypass. The attack can be launched remotely. The exploit has been made public and could be used. Upgrading to version 1.3.3-beta is able to address this issue. The patch is identified as aefaabfd7527188bfba3c8c9eee17c316d094802. The affected component should be upgraded. The project was informed beforehand and acted very professional: "We have implemented message ownership verification, so that users can only query messages related to themselves."
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 25, 2026
about 1 month ago
Last Modified
Feb 26, 2026
about 1 month ago
Vendor
szadmin
Product
sz-boot-parent
Related Vulnerabilities
This vulnerability allows an attacker to upload any type of file to a specific API endpoint, which could lead to malicious files being executed on the server. The attack can be carried out remotely, and it affects versions up to 1.3.2-beta, so it's important to upgrade to the latest version to fix the issue.
An attacker can remotely reset user passwords to a default value by manipulating a specific function in the application, potentially gaining unauthorized access to user accounts. This vulnerability affects versions up to 1.3.2-beta, and it has been publicly disclosed, so it's crucial to upgrade to version 1.3.3-beta to fix the issue.