No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 20 Feb 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:cipplanner:cipace:*:*:*:*:*:*:*:* |
Thu, 12 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-434 | |
| Metrics |
cvssV3_1
|
Thu, 12 Feb 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cipplanner
Cipplanner cipace |
|
| Vendors & Products |
Cipplanner
Cipplanner cipace |
Wed, 11 Feb 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Unrestricted Upload of File with Dangerous Type vulnerabilities exist in the rich text editor and document manage components in CIPPlanner CIPAce before 9.17. An authorized user can upload executable files when inserting images in the rich text editor, and upload executable files when uploading files on the document management page. Those executables can be executed if they are not stored in a shared directory or if the storage directory has executed permissions. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-02-12T15:23:13.367Z
Reserved: 2024-10-27T00:00:00.000Z
Link: CVE-2024-50620
Updated: 2026-02-12T15:22:59.668Z
Status : Analyzed
Published: 2026-02-11T21:16:17.580
Modified: 2026-02-20T20:18:37.927
Link: CVE-2024-50620
No data.
OpenCVE Enrichment
Updated: 2026-02-12T09:36:02Z