Cyber Posture

CVE-2026-22786

HighPublic PoC

Published: 12 January 2026

Published
12 January 2026
Modified
12 March 2026
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0059 69.3th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-22786 is a high-severity Path Traversal (CWE-22) vulnerability in Gin-Vue-Admin Project Gin-Vue-Admin. Its CVSS base score is 7.2 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 30.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-434

Requiring identifiable owners for portable devices reduces the attack surface for unrestricted uploads of dangerous file types via anonymous media.

addresses: CWE-434

Dangerous file uploads can be detonated in the chamber to determine malice before any production write or execution occurs.

addresses: CWE-434

Prevents unrestricted writing of arbitrary or malicious firmware by keeping hardware write-protect enabled except under tightly controlled manual procedures.

addresses: CWE-22

Validates pathnames and filenames to prevent traversal outside intended directories.

addresses: CWE-434

Scans files from external sources on download/open/execute, blocking unrestricted uploads of dangerous file types.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Why these techniques?

Path traversal in public web app upload endpoint directly enables T1190 exploitation and arbitrary file write for web shell deployment via T1505.003.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Gin-vue-admin is a backstage management system based on vue and gin. Gin-vue-admin <= v2.8.7 has a path traversal vulnerability in the breakpoint resume upload functionality. Attacker can upload any files on any directory. In the breakpoint_continue.go file, the MakeFile function…

more

accepts a fileName parameter through the /fileUploadAndDownload/breakpointContinueFinish API endpoint and directly concatenates it with the base directory path (./fileDir/) using os.OpenFile() without any validation for directory traversal sequences (e.g., ../). An attacker with file upload privileges could exploit this vulnerability.

Deeper analysisAI

CVE-2026-22786, published on 2026-01-12, is a path traversal vulnerability in Gin-vue-admin, a backstage management system based on Vue and Gin, affecting versions up to and including v2.8.7. The flaw exists in the breakpoint resume upload functionality, specifically the MakeFile function in breakpoint_continue.go. This function processes a fileName parameter from the /fileUploadAndDownload/breakpointContinueFinish API endpoint and concatenates it directly with the base directory path ./fileDir/ via os.OpenFile(), without validation against directory traversal sequences like ../.

An attacker with file upload privileges can exploit this vulnerability over the network with low complexity and no user interaction. Exploitation enables uploading arbitrary files to any server directory, potentially leading to unauthorized data access, modification, or deletion. The CVSS v3.1 base score is 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H), with associated CWEs CWE-22 (path traversal) and CWE-434.

Mitigation details are available in the GitHub security advisory at https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-3558-j79f-vvm6 and a related commit at https://github.com/flipped-aurora/gin-vue-admin/commit/2242f5d6e133e96d1b359ac019bf54fa0e975dd5, which addresses the issue in affected versions.

Details

CWE(s)

Affected Products

gin-vue-admin project
gin-vue-admin
≤ 2.8.7

CVEs Like This One

CVE-2025-66410Same product: Gin-Vue-Admin Project Gin-Vue-Admin
CVE-2025-2749Shared CWE-22, CWE-434
CVE-2025-35055Shared CWE-22, CWE-434
CVE-2025-68909Shared CWE-434
CVE-2025-67684Shared CWE-22
CVE-2026-32524Shared CWE-434
CVE-2025-69559Shared CWE-434
CVE-2025-54944Shared CWE-434
CVE-2025-5061Shared CWE-434
CVE-2025-55267Shared CWE-434

References