Cyber Posture

CVE-2026-1111

MediumPublic PoC

Published: 18 January 2026

Published
18 January 2026
Modified
05 February 2026
KEV Added
Patch
CVSS Score 4.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0017 37.7th percentile
Risk Priority 10 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-1111 is a medium-severity Path Traversal (CWE-22) vulnerability in Publiccms Publiccms. Its CVSS base score is 4.7 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Data from Local System (T1005); ranked at the 37.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Data from Local System (T1005) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-22

Validates pathnames and filenames to prevent traversal outside intended directories.

MITRE ATT&CK Enterprise TechniquesAI

T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
T1100 Web Shell Persistence
A Web shell is a Web script that is placed on an openly accessible Web server to allow an adversary to use the Web server as a gateway into a network.
Why these techniques?

Path traversal in Save function enables arbitrary local file read (T1005) and potential web shell deployment via template writes (T1100).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

A vulnerability has been found in Sanluan PublicCMS up to 5.202506.d. This impacts the function Save of the file com/publiccms/controller/admin/sys/TaskTemplateAdminController.java of the component Task Template Management Handler. Such manipulation of the argument path leads to path traversal. The attack can…

more

be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Deeper analysisAI

CVE-2026-1111, published on 2026-01-18, is a path traversal vulnerability (CWE-22) in Sanluan PublicCMS versions up to 5.202506.d. The flaw affects the Save function in the file com/publiccms/controller/admin/sys/TaskTemplateAdminController.java within the Task Template Management Handler component, where manipulation of the 'path' argument enables directory traversal.

The vulnerability carries a CVSS v3.1 base score of 4.7 (AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L) and can be exploited remotely. Attackers require high privileges to launch the attack, potentially achieving limited impacts such as partial disclosure of confidential information, minor file modifications, or low-level disruption of availability through unauthorized file access outside the intended paths.

Advisories from sources like VulDB and GitHub indicate the exploit has been publicly disclosed and may be in use, with references including proof-of-concept details. The vendor was contacted early but provided no response, and no patches or mitigations are detailed in available information.

Details

CWE(s)

Affected Products

publiccms
publiccms
≤ 5.202506.d

CVEs Like This One

CVE-2026-3289Same product: Publiccms Publiccms
CVE-2025-57516Same product: Publiccms Publiccms
CVE-2025-69437Same product: Publiccms Publiccms
CVE-2025-25361Same product: Publiccms Publiccms
CVE-2026-1112Same product: Publiccms Publiccms
CVE-2026-28795Shared CWE-22
CVE-2025-54794Shared CWE-22
CVE-2025-20051Shared CWE-22
CVE-2026-41205Shared CWE-22
CVE-2026-41419Shared CWE-22

References