CVE-2026-21628
Published: 05 March 2026
Summary
CVE-2026-21628 is a critical-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Templaza Astroid Framework. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 50.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-10 requires validation of information inputs, directly preventing uploads of dangerous data types that enable remote code execution.
AC-3 enforces approved authorizations, preventing unauthenticated users from accessing the vulnerable file management feature.
SI-9 restricts types and content of information inputs to systems, blocking dangerous file uploads at the boundary.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability allows unauthenticated remote code execution via exploitation of a public-facing file management feature, directly mapping to T1190: Exploit Public-Facing Application.
NVD Description
A improperly secured file management feature allows uploads of dangerous data types for unauthenticated users, leading to remote code execution.
Deeper analysisAI
CVE-2026-21628 is a vulnerability in an improperly secured file management feature that allows unauthenticated users to upload dangerous data types, leading to remote code execution. Published on 2026-03-05, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is categorized under CWE-434.
Unauthenticated attackers with network access can exploit this vulnerability with low complexity and no user interaction required. Successful exploitation enables remote code execution, granting high levels of confidentiality, integrity, and availability impact on the affected system.
Mitigation details are available in the referenced advisory at https://astroidframe.work.
Details
- CWE(s)