top of page
perceptive_background_267k.jpg

xiaoheiFS is a self-hosted financial and operational system for cloud service businesses. In versions up to and including 0.3.15, the `AdminPaymentPluginUpload`…

Published:

17 March 2026 at 23:00:00

Alert date:

18 March 2026 at 02:01:42

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Enterprise Applications

xiaoheiFS, a self-hosted financial and operational system for cloud service businesses, contains a critical remote code execution vulnerability in versions up to 0.3.15. The AdminPaymentPluginUpload endpoint allows admins to upload any file using only a hardcoded password (qweasd123456) without content validation. A background watcher process automatically executes any new executable files found in the plugins/payment/ directory every 5 seconds, leading to immediate RCE. This represents a severe security flaw combining weak authentication with automatic code execution. The vulnerability has been patched in version 4.0.0.

Technical details

Mitigation steps:

Affected products:

xiaoheiFS

Related links:

Related CVE's:

Related threat actors:

IOC's:

qweasd123456

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page