CVE-2026-1813

A vulnerability was found in bolo-blog bolo-solo up to 2.6.4. Affected is an unknown function of the file src/main/java/org/b3log/solo/bolo/pic/PicUploadProcessor.java of the component FreeMarker Template Handler. The manipulation of the argument File results in unrestricted upload. It is possible to launch the attack remotely. The exploit has been made public and could be used. The project was informed of the problem early through an issue report but has not responded yet.
References
Link Resource
https://github.com/bolo-blog/bolo-solo/ Product
https://github.com/bolo-blog/bolo-solo/issues/329 Exploit Issue Tracking Vendor Advisory
https://vuldb.com/?ctiid.343981 Permissions Required VDB Entry
https://vuldb.com/?id.343981 Third Party Advisory VDB Entry
https://vuldb.com/?submit.743402 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:adlered:bolo-solo:*:*:*:*:*:*:*:*

History

03 Mar 2026, 00:19

Type Values Removed Values Added
CPE cpe:2.3:a:adlered:bolo-solo:*:*:*:*:*:*:*:*
First Time Adlered bolo-solo
Adlered
References () https://github.com/bolo-blog/bolo-solo/ - () https://github.com/bolo-blog/bolo-solo/ - Product
References () https://github.com/bolo-blog/bolo-solo/issues/329 - () https://github.com/bolo-blog/bolo-solo/issues/329 - Exploit, Issue Tracking, Vendor Advisory
References () https://vuldb.com/?ctiid.343981 - () https://vuldb.com/?ctiid.343981 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.343981 - () https://vuldb.com/?id.343981 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.743402 - () https://vuldb.com/?submit.743402 - Third Party Advisory, VDB Entry
Summary
  • (es) Se encontró una vulnerabilidad en bolo-blog bolo-solo hasta la versión 2.6.4. Afecta a una función desconocida del archivo src/main/java/org/b3log/solo/bolo/pic/PicUploadProcessor.java del componente FreeMarker Template Handler. La manipulación del argumento File resulta en una carga sin restricciones. Es posible lanzar el ataque de forma remota. El exploit se ha hecho público y podría usarse. Se informó al proyecto del problema con antelación a través de un informe de incidencias, pero aún no ha respondido.

04 Feb 2026, 00:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-04 00:16

Updated : 2026-03-03 00:19


NVD link : CVE-2026-1813

Mitre link : CVE-2026-1813

CVE.ORG link : CVE-2026-1813


JSON object : View

Products Affected

adlered

  • bolo-solo
CWE
CWE-284

Improper Access Control

CWE-434

Unrestricted Upload of File with Dangerous Type