CVE-2026-1021
Published: 16 January 2026
Summary
CVE-2026-1021 is a critical-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Gotac Police Statistics Database System. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 25.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly validates file uploads to block arbitrary web shell uploads and prevent remote code execution.
Enforces access control policies requiring authentication for file upload operations, blocking unauthenticated exploitation.
Scans uploads at entry points for malicious code like web shells, eradicating them before execution.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Arbitrary file upload vulnerability on a public-facing web application directly enables unauthenticated web shell deployment (T1505.003) and remote exploitation of the exposed server (T1190).
NVD Description
Police Statistics Database System developed by Gotac has an Arbitrary File Upload vulnerability, allowing unauthenticated remote attacker to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server.
Deeper analysisAI
CVE-2026-1021 is an Arbitrary File Upload vulnerability (CWE-434) affecting the Police Statistics Database System developed by Gotac. Published on 2026-01-16, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its potential for high-impact remote exploitation without authentication or user interaction.
An unauthenticated remote attacker can exploit this vulnerability over the network with low complexity to upload web shell backdoors. Successful exploitation enables arbitrary code execution on the server, granting high levels of confidentiality, integrity, and availability impact.
Mitigation details and advisories are provided by TWCERT at https://www.twcert.org.tw/en/cp-139-10638-0e44b-2.html and https://www.twcert.org.tw/tw/cp-132-10637-3e4b3-1.html.
Details
- CWE(s)