CVE-2026-26682
Published: 26 February 2026
Summary
CVE-2026-26682 is a high-severity Code Injection (CWE-94) vulnerability in Xjd2020 Fastcms. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 8.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the CVE by requiring timely identification, reporting, and patching of the code injection flaw in PluginController.java to version 0.1.6 or later.
Prevents arbitrary code execution by enforcing validation of untrusted inputs to the vulnerable PluginController.java component.
Limits the scope and impact of local low-privilege arbitrary code execution by enforcing least privilege on the fastCMS application processes.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Local code injection (CWE-94) in PluginController directly enables arbitrary code execution from low-privileged context, matching Exploitation for Privilege Escalation (T1068).
NVD Description
An issue in fastCMS before v.0.1.6 allows a local attacker to execute arbitrary code via the PluginController.java component
Deeper analysisAI
CVE-2026-26682 is a code injection vulnerability (CWE-94) in fastCMS versions prior to 0.1.6. The flaw exists in the PluginController.java component, which allows arbitrary code execution. Published on 2026-02-26, it carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact with local access.
A local attacker with low privileges can exploit the vulnerability through low-complexity means without requiring user interaction. Exploitation grants the ability to execute arbitrary code on the affected system, resulting in high impacts to confidentiality, integrity, and availability.
Mitigation requires upgrading to fastCMS version 0.1.6 or later. Further technical details, including a proof-of-concept, are documented in the referenced sources: a GitHub Gist at https://gist.github.com/sorzs/e3913b814e2e5548aa66de6c25b0510a and a GitHub repository at https://github.com/sorzs/test/tree/main/fastcms-rce.
Details
- CWE(s)