Cyber Posture

CVE-2026-7733

High

Published: 04 May 2026

Published
04 May 2026
Modified
04 May 2026
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0004 13.6th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

A flaw has been found in funadmin up to 7.1.0-rc6. This affects the function UploadService::chunkUpload of the file app/common/service/UploadService.php of the component Frontend Chunked Upload Endpoint. This manipulation of the argument File causes unrestricted upload. The attack is possible to…

more

be carried out remotely. The exploit has been published and may be used. Patch name: 59. To fix this issue, it is recommended to deploy a patch.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the unrestricted file upload flaw in the chunkUpload function by requiring timely patching as recommended in advisory patch #59.

prevent

Requires validation of the manipulated File argument in the Frontend Chunked Upload Endpoint to prevent arbitrary file uploads.

prevent

Restricts insertion of unauthorized file types into the system via the vulnerable chunked upload mechanism, blocking exploitation.

Security SummaryAI

CVE-2026-7733 is an unrestricted file upload vulnerability affecting FunAdmin versions up to 7.1.0-rc6. The issue lies in the `chunkUpload` function of the `UploadService` class, located in the file `app/common/service/UploadService.php`, which is part of the Frontend Chunked Upload Endpoint. Attackers can manipulate the `File` argument to bypass restrictions and upload arbitrary files.

Remote attackers require no privileges or user interaction to exploit this vulnerability, as reflected in its CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). Exploitation enables limited impacts on confidentiality, integrity, and availability, potentially allowing attackers to upload malicious files for further compromise. An exploit has been published and may be used in attacks.

Advisories recommend deploying patch #59 from the FunAdmin Gitee repository to fix this issue. Relevant resources include the project repository at https://gitee.com/funadmin/funadmin/, issue tracker at https://gitee.com/funadmin/funadmin/issues/IJ8NXT, and pull request at https://gitee.com/funadmin/funadmin/pulls/59, along with VulDB entries at https://vuldb.com/submit/807559 and https://vuldb.com/vuln/360908.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Why these techniques?

Unrestricted file upload in public-facing web app directly enables remote exploitation (T1190) and arbitrary malicious file/web shell deployment (T1505.003) with no auth required.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

References