Skip to content

Commit ea4d0d6

Browse files
1 parent 8f637c7 commit ea4d0d6

2 files changed

Lines changed: 62 additions & 12 deletions

File tree

advisories/unreviewed/2026/02/GHSA-gcxp-xg77-798j/GHSA-gcxp-xg77-798j.json renamed to advisories/github-reviewed/2026/02/GHSA-gcxp-xg77-798j/GHSA-gcxp-xg77-798j.json

Lines changed: 31 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-gcxp-xg77-798j",
4-
"modified": "2026-02-22T03:30:26Z",
4+
"modified": "2026-02-26T15:32:52Z",
55
"published": "2026-02-22T03:30:26Z",
66
"aliases": [
77
"CVE-2026-2898"
88
],
9+
"summary": "funadmin: Deserialization Vulnerability in Backend Endpoint via AuthCloudService getMember Function",
910
"details": "A vulnerability was detected in funadmin up to 7.1.0-rc4. This issue affects the function getMember of the file app/common/service/AuthCloudService.php of the component Backend Endpoint. The manipulation of the argument cloud_account results in deserialization. The attack may be performed from remote. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.",
1011
"severity": [
1112
{
@@ -14,10 +15,30 @@
1415
},
1516
{
1617
"type": "CVSS_V4",
17-
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P"
19+
}
20+
],
21+
"affected": [
22+
{
23+
"package": {
24+
"ecosystem": "Packagist",
25+
"name": "funadmin/funadmin"
26+
},
27+
"ranges": [
28+
{
29+
"type": "ECOSYSTEM",
30+
"events": [
31+
{
32+
"introduced": "0"
33+
},
34+
{
35+
"last_affected": "7.1.0-rc4"
36+
}
37+
]
38+
}
39+
]
1840
}
1941
],
20-
"affected": [],
2142
"references": [
2243
{
2344
"type": "ADVISORY",
@@ -31,6 +52,10 @@
3152
"type": "WEB",
3253
"url": "https://github.com/I4m6da/CVE/issues/5#issue-3890444166"
3354
},
55+
{
56+
"type": "PACKAGE",
57+
"url": "https://github.com/funadmin/funadmin"
58+
},
3459
{
3560
"type": "WEB",
3661
"url": "https://vuldb.com/?ctiid.347209"
@@ -49,9 +74,9 @@
4974
"CWE-20",
5075
"CWE-502"
5176
],
52-
"severity": "MODERATE",
53-
"github_reviewed": false,
54-
"github_reviewed_at": null,
77+
"severity": "LOW",
78+
"github_reviewed": true,
79+
"github_reviewed_at": "2026-02-26T15:32:52Z",
5580
"nvd_published_at": "2026-02-22T01:16:00Z"
5681
}
5782
}

advisories/unreviewed/2026/02/GHSA-rfh7-7v27-6p9r/GHSA-rfh7-7v27-6p9r.json renamed to advisories/github-reviewed/2026/02/GHSA-rfh7-7v27-6p9r/GHSA-rfh7-7v27-6p9r.json

Lines changed: 31 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-rfh7-7v27-6p9r",
4-
"modified": "2026-02-22T03:30:26Z",
4+
"modified": "2026-02-26T15:33:00Z",
55
"published": "2026-02-22T03:30:26Z",
66
"aliases": [
77
"CVE-2026-2897"
88
],
9+
"summary": "funadmin: XSS through Value argument in Backend Interface component",
910
"details": "A security vulnerability has been detected in funadmin up to 7.1.0-rc4. This vulnerability affects unknown code of the file app/backend/view/index/index.html of the component Backend Interface. The manipulation of the argument Value leads to cross site scripting. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.",
1011
"severity": [
1112
{
@@ -14,10 +15,30 @@
1415
},
1516
{
1617
"type": "CVSS_V4",
17-
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P"
19+
}
20+
],
21+
"affected": [
22+
{
23+
"package": {
24+
"ecosystem": "Packagist",
25+
"name": "funadmin/funadmin"
26+
},
27+
"ranges": [
28+
{
29+
"type": "ECOSYSTEM",
30+
"events": [
31+
{
32+
"introduced": "0"
33+
},
34+
{
35+
"last_affected": "7.1.0-rc4"
36+
}
37+
]
38+
}
39+
]
1840
}
1941
],
20-
"affected": [],
2142
"references": [
2243
{
2344
"type": "ADVISORY",
@@ -31,6 +52,10 @@
3152
"type": "WEB",
3253
"url": "https://github.com/I4m6da/CVE/issues/4#issue-3890421022"
3354
},
55+
{
56+
"type": "PACKAGE",
57+
"url": "https://github.com/funadmin/funadmin"
58+
},
3459
{
3560
"type": "WEB",
3661
"url": "https://vuldb.com/?ctiid.347208"
@@ -48,9 +73,9 @@
4873
"cwe_ids": [
4974
"CWE-79"
5075
],
51-
"severity": "MODERATE",
52-
"github_reviewed": false,
53-
"github_reviewed_at": null,
76+
"severity": "LOW",
77+
"github_reviewed": true,
78+
"github_reviewed_at": "2026-02-26T15:33:00Z",
5479
"nvd_published_at": "2026-02-22T01:16:00Z"
5580
}
5681
}

0 commit comments

Comments
 (0)