jizhiCMS 1.6.7 contains a file download vulnerability in the admin plugins update endpoint that allows authenticated administrators to download arbitrary files. Attackers can exploit the vulnerability by sending crafted POST requests with malicious filepath and download_url parameters to trigger unauthorized file downloads.
References
| Link | Resource |
|---|---|
| https://www.exploit-db.com/exploits/48361 | Exploit VDB Entry |
| https://www.jizhicms.cn/ | Product |
| https://www.vulncheck.com/advisories/jizhicms-arbitrary-file-download | Third Party Advisory |
Configurations
History
24 Feb 2026, 21:22
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| References | () https://www.exploit-db.com/exploits/48361 - Exploit, VDB Entry | |
| References | () https://www.jizhicms.cn/ - Product | |
| References | () https://www.vulncheck.com/advisories/jizhicms-arbitrary-file-download - Third Party Advisory | |
| First Time |
Jizhicms
Jizhicms jizhicms |
|
| CPE | cpe:2.3:a:jizhicms:jizhicms:1.6.7:*:*:*:*:*:*:* |
05 Feb 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-05 17:16
Updated : 2026-02-24 21:22
NVD link : CVE-2020-37117
Mitre link : CVE-2020-37117
CVE.ORG link : CVE-2020-37117
JSON object : View
Products Affected
jizhicms
- jizhicms
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
