{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T15:30:22.427","vulnerabilities":[{"cve":{"id":"CVE-2026-28673","sourceIdentifier":"security-advisories@github.com","published":"2026-03-18T01:16:05.117","lastModified":"2026-03-23T17:58:19.487","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"xiaoheiFS is a self-hosted financial and operational system for cloud service businesses. In versions up to and including 0.3.15, the standard plugin system allows admins to upload a ZIP file containing a binary and a `manifest.json`. The server trusts the `binaries` field in the manifest and executes the specified file without any validation of its contents or behavior, leading to Remote Code Execution (RCE). Version 0.4.0 fixes the issue."},{"lang":"es","value":"xiaoheiFS es un sistema financiero y operativo autoalojado para negocios de servicios en la nube. En versiones hasta la 0.3.15 inclusive, el sistema de plugin estándar permite a los administradores subir un archivo ZIP que contiene un binario y un `manifest.json`. El servidor confía en el campo `binaries` en el manifiesto y ejecuta el archivo especificado sin ninguna validación de su contenido o comportamiento, lo que lleva a la ejecución remota de código (RCE). La versión 0.4.0 soluciona el problema."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-78"},{"lang":"en","value":"CWE-434"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:danvei233:xiaoheifs:*:*:*:*:*:*:*:*","versionEndExcluding":"0.4.0","matchCriteriaId":"D0180A96-D887-4385-AC4F-58ECEAAC15D3"}]}]}],"references":[{"url":"https://github.com/danvei233/xiaoheiFS/security/advisories/GHSA-4vw4-5wmh-7x4v","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]},{"url":"https://github.com/danvei233/xiaoheiFS/security/advisories/GHSA-4vw4-5wmh-7x4v","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Vendor Advisory"]}]}}]}