jizhiCMS 1.6.7 contains a file download vulnerability in the admin plugins update endpoint that allows authenticated administrators to download arbitrary files. Attackers can exploit the vulnerability by sending crafted POST requests with malicious filepath and download_url parameters to trigger unauthorized file downloads.
History

Thu, 05 Feb 2026 16:30:00 +0000

Type Values Removed Values Added
Description jizhiCMS 1.6.7 contains a file download vulnerability in the admin plugins update endpoint that allows authenticated administrators to download arbitrary files. Attackers can exploit the vulnerability by sending crafted POST requests with malicious filepath and download_url parameters to trigger unauthorized file downloads.
Title jizhiCMS 1.6.7 - Arbitrary File Download
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-02-05T16:13:29.477Z

Reserved: 2026-02-03T16:27:45.303Z

Link: CVE-2020-37117

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-02-05T17:16:05.513

Modified: 2026-02-05T17:16:05.513

Link: CVE-2020-37117

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.