CVE-2026-2010

A vulnerability has been found in Sanluan PublicCMS up to 4.0.202506.d/5.202506.d/6.202506.d. Impacted is the function Paid of the file publiccms-parent/publiccms-trade/src/main/java/com/publiccms/logic/service/trade/TradePaymentService.java of the component Trade Payment Handler. The manipulation of the argument paymentId leads to improper authorization. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitability is considered difficult. The exploit has been disclosed to the public and may be used. The identifier of the patch is 7329437e1288540336b1c66c114ed3363adcba02. It is recommended to apply a patch to fix this issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:publiccms:publiccms:*:*:*:*:*:*:*:*
cpe:2.3:a:publiccms:publiccms:*:*:*:*:*:*:*:*

History

17 Feb 2026, 19:12

Type Values Removed Values Added
References () https://github.com/sanluan/PublicCMS/ - () https://github.com/sanluan/PublicCMS/ - Product
References () https://github.com/sanluan/PublicCMS/commit/7329437e1288540336b1c66c114ed3363adcba02 - () https://github.com/sanluan/PublicCMS/commit/7329437e1288540336b1c66c114ed3363adcba02 - Patch
References () https://github.com/sanluan/PublicCMS/issues/108 - () https://github.com/sanluan/PublicCMS/issues/108 - Exploit, Vendor Advisory
References () https://github.com/sanluan/PublicCMS/issues/108#issue-3838143772 - () https://github.com/sanluan/PublicCMS/issues/108#issue-3838143772 - Exploit, Vendor Advisory
References () https://vuldb.com/?ctiid.344592 - () https://vuldb.com/?ctiid.344592 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.344592 - () https://vuldb.com/?id.344592 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.743487 - () https://vuldb.com/?submit.743487 - Third Party Advisory, VDB Entry
Summary
  • (es) Una vulnerabilidad ha sido encontrada en Sanluan PublicCMS hasta 4.0.202506.d/5.202506.d/6.202506.d. Afectada es la función Paid del archivo publiccms-parent/publiccms-trade/src/main/java/com/publiccms/logic/service/trade/TradePaymentService.java del componente Trade Payment Handler. La manipulación del argumento paymentId lleva a autorización impropia. El ataque puede ser iniciado remotamente. La complejidad de un ataque es bastante alta. La explotabilidad es considerada difícil. El exploit ha sido divulgado al público y puede ser usado. El identificador del parche es 7329437e1288540336b1c66c114ed3363adcba02. Se recomienda aplicar un parche para solucionar este problema.
CPE cpe:2.3:a:publiccms:publiccms:*:*:*:*:*:*:*:*
CWE CWE-639
First Time Publiccms publiccms
Publiccms

06 Feb 2026, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-06 08:15

Updated : 2026-02-17 19:12


NVD link : CVE-2026-2010

Mitre link : CVE-2026-2010

CVE.ORG link : CVE-2026-2010


JSON object : View

Products Affected

publiccms

  • publiccms
CWE
CWE-266

Incorrect Privilege Assignment

CWE-285

Improper Authorization

CWE-639

Authorization Bypass Through User-Controlled Key