2
0
2
0
Vulnerability Timeline
2 vulnerabilities discovered over time for Ujcms
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2026-2954 | 5.3 | This vulnerability allows an attacker to remotely inject malicious code into the UJCMS system by manipulating specific input fields in the import function. It can be exploited without any special access, making it a serious risk for systems running the affected version. | ujcmsujcms | Exploit Available | about 1 month agoFeb 22, 2026 |
| CVE-2026-2953 | 5.3 | An attacker can exploit a vulnerability in Dromara UJCMS to gain unauthorized access to files on the server by manipulating the deleteDirectory function, potentially allowing them to delete or alter important files. This attack can be carried out remotely, and since the vendor has not responded to the issue, it remains a risk for users of this software. | ujcmsujcms | Exploit Available | about 1 month agoFeb 22, 2026 |
About Ujcms Ujcms Security
This page provides comprehensive security vulnerability tracking for Ujcms Ujcms. Our database includes all CVEs affecting this product, updated in real-time from official sources.
Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.
Security Recommendations
- • Always keep Ujcms updated to the latest version
- • Subscribe to security advisories from Ujcms
- • Monitor this page for new vulnerabilities affecting your version
- • Prioritize patching critical and high severity issues immediately