CVE-2026-7733
Published: 04 May 2026
Description
A flaw has been found in funadmin up to 7.1.0-rc6. This affects the function UploadService::chunkUpload of the file app/common/service/UploadService.php of the component Frontend Chunked Upload Endpoint. This manipulation of the argument File causes unrestricted upload. The attack is possible to…
more
be carried out remotely. The exploit has been published and may be used. Patch name: 59. To fix this issue, it is recommended to deploy a patch.
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the unrestricted file upload flaw in the chunkUpload function by requiring timely patching as recommended in advisory patch #59.
Requires validation of the manipulated File argument in the Frontend Chunked Upload Endpoint to prevent arbitrary file uploads.
Restricts insertion of unauthorized file types into the system via the vulnerable chunked upload mechanism, blocking exploitation.
Security SummaryAI
CVE-2026-7733 is an unrestricted file upload vulnerability affecting FunAdmin versions up to 7.1.0-rc6. The issue lies in the `chunkUpload` function of the `UploadService` class, located in the file `app/common/service/UploadService.php`, which is part of the Frontend Chunked Upload Endpoint. Attackers can manipulate the `File` argument to bypass restrictions and upload arbitrary files.
Remote attackers require no privileges or user interaction to exploit this vulnerability, as reflected in its CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). Exploitation enables limited impacts on confidentiality, integrity, and availability, potentially allowing attackers to upload malicious files for further compromise. An exploit has been published and may be used in attacks.
Advisories recommend deploying patch #59 from the FunAdmin Gitee repository to fix this issue. Relevant resources include the project repository at https://gitee.com/funadmin/funadmin/, issue tracker at https://gitee.com/funadmin/funadmin/issues/IJ8NXT, and pull request at https://gitee.com/funadmin/funadmin/pulls/59, along with VulDB entries at https://vuldb.com/submit/807559 and https://vuldb.com/vuln/360908.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unrestricted file upload in public-facing web app directly enables remote exploitation (T1190) and arbitrary malicious file/web shell deployment (T1505.003) with no auth required.