CVE-2026-21628
Published: 05 March 2026
Description
A improperly secured file management feature allows uploads of dangerous data types for unauthenticated users, leading to remote code execution.
Mitigating Controls (NIST 800-53 r5)AI
SI-10 requires validation of information inputs, directly preventing uploads of dangerous data types that enable remote code execution.
AC-3 enforces approved authorizations, preventing unauthenticated users from accessing the vulnerable file management feature.
SI-9 restricts types and content of information inputs to systems, blocking dangerous file uploads at the boundary.
Security SummaryAI
CVE-2026-21628 is a vulnerability in an improperly secured file management feature that allows unauthenticated users to upload dangerous data types, leading to remote code execution. Published on 2026-03-05, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is categorized under CWE-434.
Unauthenticated attackers with network access can exploit this vulnerability with low complexity and no user interaction required. Successful exploitation enables remote code execution, granting high levels of confidentiality, integrity, and availability impact on the affected system.
Mitigation details are available in the referenced advisory at https://astroidframe.work.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability allows unauthenticated remote code execution via exploitation of a public-facing file management feature, directly mapping to T1190: Exploit Public-Facing Application.