CVE-2020-37117

jizhiCMS 1.6.7 contains a file download vulnerability in the admin plugins update endpoint that allows authenticated administrators to download arbitrary files. Attackers can exploit the vulnerability by sending crafted POST requests with malicious filepath and download_url parameters to trigger unauthorized file downloads.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jizhicms:jizhicms:1.6.7:*:*:*:*:*:*:*

History

24 Feb 2026, 21:22

Type Values Removed Values Added
Summary
  • (es) jizhiCMS 1.6.7 contiene una vulnerabilidad de descarga de archivos en el endpoint de actualización de plugins de administrador que permite a los administradores autenticados descargar archivos arbitrarios. Los atacantes pueden explotar la vulnerabilidad enviando solicitudes POST manipuladas con parámetros filepath y download_url maliciosos para desencadenar descargas de archivos no autorizadas.
References () https://www.exploit-db.com/exploits/48361 - () https://www.exploit-db.com/exploits/48361 - Exploit, VDB Entry
References () https://www.jizhicms.cn/ - () https://www.jizhicms.cn/ - Product
References () https://www.vulncheck.com/advisories/jizhicms-arbitrary-file-download - () https://www.vulncheck.com/advisories/jizhicms-arbitrary-file-download - Third Party Advisory
First Time Jizhicms
Jizhicms jizhicms
CPE cpe:2.3:a:jizhicms:jizhicms:1.6.7:*:*:*:*:*:*:*

05 Feb 2026, 17:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-05 17:16

Updated : 2026-02-24 21:22


NVD link : CVE-2020-37117

Mitre link : CVE-2020-37117

CVE.ORG link : CVE-2020-37117


JSON object : View

Products Affected

jizhicms

  • jizhicms
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type