


Perceptive Security
SOC/SIEM Consultancy

jizhiCMS 1.6.7 contains a file download vulnerability in the admin plugins update endpoint that allows authenticated administrators to download arbitrary files.…
Published:
4 February 2026 at 23:00:00
Alert date:
5 February 2026 at 21:07:15
Source:
nvd.nist.gov
Web Technologies
jizhiCMS version 1.6.7 contains a file download vulnerability in the admin plugins update endpoint that allows authenticated administrators to download arbitrary files from the system. The vulnerability can be exploited by sending crafted POST requests with malicious filepath and download_url parameters to trigger unauthorized file downloads. This security flaw affects the administrative interface of the content management system and requires administrative authentication to exploit. The vulnerability has been documented with exploit code available and affects the file handling functionality within the CMS admin panel.
Technical details
Mitigation steps:
Affected products:
jizhiCMS
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2020-37117
https://www.exploit-db.com/exploits/48361
https://www.jizhicms.cn/
https://www.vulncheck.com/advisories/jizhicms-arbitrary-file-download
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
