Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
6.9
Vaelsys 4.1.0 Allows Remote Code Execution
CVE-2026-2952
Summary
A security flaw in Vaelsys 4.1.0 allows hackers to execute malicious code on your server. This can happen when a hacker sends a specific request to your Vaelsys server. It's essential to update Vaelsys to the latest version to fix this issue.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| vaelsys | vaelsys | 4.1.0 | – |
Original title
A flaw has been found in Vaelsys 4.1.0. This vulnerability affects unknown code of the file /tree/tree_server.php of the component HTTP POST Request Handler. This manipulation of the argument xajax...
Original description
A flaw has been found in Vaelsys 4.1.0. This vulnerability affects unknown code of the file /tree/tree_server.php of the component HTTP POST Request Handler. This manipulation of the argument xajaxargs causes os command injection. The attack is possible to be carried out remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
nvd CVSS2.0
7.5
nvd CVSS3.1
9.8
nvd CVSS4.0
6.9
Vulnerability type
CWE-77
Command Injection
CWE-78
OS Command Injection
- https://github.com/CVE-Hunter-Leo/CVE/issues/10 Exploit Issue Tracking Third Party Advisory
- https://vuldb.com/?ctiid.347318 Permissions Required VDB Entry
- https://vuldb.com/?id.347318 Third Party Advisory VDB Entry
- https://vuldb.com/?submit.755166 Third Party Advisory VDB Entry
Published: 22 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026