Gin-vue-admin is a backstage management system based on vue and gin. Gin-vue-admin <= v2.8.7 has a path traversal vulnerability in the breakpoint resume upload functionality. Attacker can upload any files on any directory. In the breakpoint_continue.go file, the MakeFile function accepts a fileName parameter through the /fileUploadAndDownload/breakpointContinueFinish API endpoint and directly concatenates it with the base directory path (./fileDir/) using os.OpenFile() without any validation for directory traversal sequences (e.g., ../). An attacker with file upload privileges could exploit this vulnerability.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-3558-j79f-vvm6 Gin-vue-admin has arbitrary file upload vulnerability caused by path traversal
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 13 Jan 2026 19:30:00 +0000

Type Values Removed Values Added
Title The arbitrary file upload vulnerability caused by path traversal is on github.com/flipped-aurora/gin-vue-admin Gin-vue-admin has arbitrary file upload vulnerability caused by path traversal

Tue, 13 Jan 2026 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Flipped-aurora
Flipped-aurora gin-vue-admin
Vendors & Products Flipped-aurora
Flipped-aurora gin-vue-admin

Mon, 12 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 12 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Description Gin-vue-admin is a backstage management system based on vue and gin. Gin-vue-admin <= v2.8.7 has a path traversal vulnerability in the breakpoint resume upload functionality. Attacker can upload any files on any directory. In the breakpoint_continue.go file, the MakeFile function accepts a fileName parameter through the /fileUploadAndDownload/breakpointContinueFinish API endpoint and directly concatenates it with the base directory path (./fileDir/) using os.OpenFile() without any validation for directory traversal sequences (e.g., ../). An attacker with file upload privileges could exploit this vulnerability.
Title The arbitrary file upload vulnerability caused by path traversal is on github.com/flipped-aurora/gin-vue-admin
Weaknesses CWE-22
CWE-434
References
Metrics cvssV4_0

{'score': 7.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-13T19:15:06.777Z

Reserved: 2026-01-09T18:27:19.388Z

Link: CVE-2026-22786

cve-icon Vulnrichment

Updated: 2026-01-12T21:28:02.174Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-01-12T22:16:08.190

Modified: 2026-01-13T14:03:18.990

Link: CVE-2026-22786

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-01-13T09:27:27Z

Weaknesses