Cyber Posture

CVE-2026-7733

High

Published: 04 May 2026

Published
04 May 2026
Modified
05 May 2026
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0006 18.4th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-7733 is a high-severity Improper Access Control (CWE-284) vulnerability in Gitee (inferred from references). Its CVSS base score is 7.3 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 18.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the unrestricted file upload flaw in the chunkUpload function by requiring timely patching as recommended in advisory patch #59.

prevent

Requires validation of the manipulated File argument in the Frontend Chunked Upload Endpoint to prevent arbitrary file uploads.

prevent

Restricts insertion of unauthorized file types into the system via the vulnerable chunked upload mechanism, blocking exploitation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Why these techniques?

Unrestricted file upload in public-facing web app directly enables remote exploitation (T1190) and arbitrary malicious file/web shell deployment (T1505.003) with no auth required.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A flaw has been found in funadmin up to 7.1.0-rc6. This affects the function UploadService::chunkUpload of the file app/common/service/UploadService.php of the component Frontend Chunked Upload Endpoint. This manipulation of the argument File causes unrestricted upload. The attack is possible to…

more

be carried out remotely. The exploit has been published and may be used. Patch name: 59. To fix this issue, it is recommended to deploy a patch.

Deeper analysisAI

CVE-2026-7733 is an unrestricted file upload vulnerability affecting FunAdmin versions up to 7.1.0-rc6. The issue lies in the `chunkUpload` function of the `UploadService` class, located in the file `app/common/service/UploadService.php`, which is part of the Frontend Chunked Upload Endpoint. Attackers can manipulate the `File` argument to bypass restrictions and upload arbitrary files.

Remote attackers require no privileges or user interaction to exploit this vulnerability, as reflected in its CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). Exploitation enables limited impacts on confidentiality, integrity, and availability, potentially allowing attackers to upload malicious files for further compromise. An exploit has been published and may be used in attacks.

Advisories recommend deploying patch #59 from the FunAdmin Gitee repository to fix this issue. Relevant resources include the project repository at https://gitee.com/funadmin/funadmin/, issue tracker at https://gitee.com/funadmin/funadmin/issues/IJ8NXT, and pull request at https://gitee.com/funadmin/funadmin/pulls/59, along with VulDB entries at https://vuldb.com/submit/807559 and https://vuldb.com/vuln/360908.

Details

CWE(s)

Affected Products

Gitee
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-2979Shared CWE-284, CWE-434
CVE-2025-7470Shared CWE-284, CWE-434
CVE-2026-3800Shared CWE-284, CWE-434
CVE-2026-4220Shared CWE-284, CWE-434
CVE-2026-4536Shared CWE-284, CWE-434
CVE-2025-15495Shared CWE-284, CWE-434
CVE-2026-3748Shared CWE-284, CWE-434
CVE-2026-1152Shared CWE-284, CWE-434
CVE-2026-2213Shared CWE-284, CWE-434
CVE-2025-15404Shared CWE-284, CWE-434

References