{"api_version":"1","generated_at":"2026-05-18T05:29:06+00:00","cve":"CVE-2026-2010","urls":{"html":"https://cve.report/CVE-2026-2010","api":"https://cve.report/api/cve/CVE-2026-2010.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-2010","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-2010"},"summary":{"title":"Sanluan PublicCMS Trade Payment TradePaymentService.java paid improper authorization","description":"A vulnerability has been found in Sanluan PublicCMS up to 4.0.202506.d/5.202506.d/6.202506.d. Impacted is the function Paid of the file publiccms-parent/publiccms-trade/src/main/java/com/publiccms/logic/service/trade/TradePaymentService.java of the component Trade Payment Handler. The manipulation of the argument paymentId leads to improper authorization. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitability is considered difficult. The exploit has been disclosed to the public and may be used. The identifier of the patch is 7329437e1288540336b1c66c114ed3363adcba02. It is recommended to apply a patch to fix this issue.","state":"PUBLISHED","assigner":"VulDB","published_at":"2026-02-06 08:15:54","updated_at":"2026-04-29 01:00:01"},"problem_types":["CWE-266","CWE-285","CWE-639","CWE-285 Improper Authorization","CWE-266 Incorrect Privilege Assignment"],"metrics":[{"version":"4.0","source":"cna@vuldb.com","type":"Secondary","score":"1.3","severity":"LOW","vector":"CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","data":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":1.3,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"HIGH","attackRequirements":"NONE","privilegesRequired":"LOW","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"LOW","vulnAvailabilityImpact":"LOW","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"PROOF_OF_CONCEPT","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}},{"version":"4.0","source":"CNA","type":"DECLARED","score":"2.3","severity":"LOW","vector":"CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","data":{"baseScore":2.3,"baseSeverity":"LOW","vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","version":"4.0"}},{"version":"3.1","source":"nvd@nist.gov","type":"Primary","score":"4.2","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L","baseScore":4.2,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"LOW"}},{"version":"3.1","source":"cna@vuldb.com","type":"Secondary","score":"4.2","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L","baseScore":4.2,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"LOW"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"4.2","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L/E:P/RL:O/RC:C","data":{"baseScore":4.2,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L/E:P/RL:O/RC:C","version":"3.1"}},{"version":"3.0","source":"CNA","type":"DECLARED","score":"4.2","severity":"MEDIUM","vector":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L/E:P/RL:O/RC:C","data":{"baseScore":4.2,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L/E:P/RL:O/RC:C","version":"3.0"}},{"version":"2.0","source":"cna@vuldb.com","type":"Secondary","score":"3.6","severity":"","vector":"AV:N/AC:H/Au:S/C:N/I:P/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:H/Au:S/C:N/I:P/A:P","baseScore":3.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"}},{"version":"2.0","source":"CNA","type":"DECLARED","score":"3.6","severity":"","vector":"AV:N/AC:H/Au:S/C:N/I:P/A:P/E:POC/RL:OF/RC:C","data":{"baseScore":3.6,"vectorString":"AV:N/AC:H/Au:S/C:N/I:P/A:P/E:POC/RL:OF/RC:C","version":"2.0"}}],"references":[{"url":"https://github.com/sanluan/PublicCMS/commit/7329437e1288540336b1c66c114ed3363adcba02","name":"https://github.com/sanluan/PublicCMS/commit/7329437e1288540336b1c66c114ed3363adcba02","refsource":"cna@vuldb.com","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/sanluan/PublicCMS/issues/108#issue-3838143772","name":"https://github.com/sanluan/PublicCMS/issues/108#issue-3838143772","refsource":"cna@vuldb.com","tags":["Exploit","Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://vuldb.com/?ctiid.344592","name":"https://vuldb.com/?ctiid.344592","refsource":"cna@vuldb.com","tags":["Permissions Required","VDB Entry"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/sanluan/PublicCMS/","name":"https://github.com/sanluan/PublicCMS/","refsource":"cna@vuldb.com","tags":["Product"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://vuldb.com/?submit.743487","name":"https://vuldb.com/?submit.743487","refsource":"cna@vuldb.com","tags":["Third Party Advisory","VDB Entry"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/sanluan/PublicCMS/issues/108","name":"https://github.com/sanluan/PublicCMS/issues/108","refsource":"cna@vuldb.com","tags":["Exploit","Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://vuldb.com/?id.344592","name":"https://vuldb.com/?id.344592","refsource":"cna@vuldb.com","tags":["Third Party Advisory","VDB Entry"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-2010","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2010","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Sanluan","product":"PublicCMS","version":"affected 4.0.202506.a","platforms":[]},{"source":"CNA","vendor":"Sanluan","product":"PublicCMS","version":"affected 4.0.202506.b","platforms":[]},{"source":"CNA","vendor":"Sanluan","product":"PublicCMS","version":"affected 4.0.202506.c","platforms":[]},{"source":"CNA","vendor":"Sanluan","product":"PublicCMS","version":"affected 4.0.202506.d","platforms":[]},{"source":"CNA","vendor":"Sanluan","product":"PublicCMS","version":"affected 5.202506.a","platforms":[]},{"source":"CNA","vendor":"Sanluan","product":"PublicCMS","version":"affected 5.202506.b","platforms":[]},{"source":"CNA","vendor":"Sanluan","product":"PublicCMS","version":"affected 5.202506.c","platforms":[]},{"source":"CNA","vendor":"Sanluan","product":"PublicCMS","version":"affected 5.202506.d","platforms":[]},{"source":"CNA","vendor":"Sanluan","product":"PublicCMS","version":"affected 6.202506.a","platforms":[]},{"source":"CNA","vendor":"Sanluan","product":"PublicCMS","version":"affected 6.202506.b","platforms":[]},{"source":"CNA","vendor":"Sanluan","product":"PublicCMS","version":"affected 6.202506.c","platforms":[]},{"source":"CNA","vendor":"Sanluan","product":"PublicCMS","version":"affected 6.202506.d","platforms":[]}],"timeline":[{"source":"CNA","time":"2026-02-05T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"source":"CNA","time":"2026-02-05T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"source":"CNA","time":"2026-02-18T01:03:36.000Z","lang":"en","value":"VulDB entry last update"}],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"AliceS614 (VulDB User)","lang":"en"}],"nvd_cpes":[{"cve_year":"2026","cve_id":"2010","vulnerable":"1","versionEndIncluding":"4.0.202506.d","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"publiccms","cpe5":"publiccms","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"2010","vulnerable":"1","versionEndIncluding":"5.202506.d","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"publiccms","cpe5":"publiccms","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-2010","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2026-02-12T15:05:30.584584Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-02-12T15:05:45.408Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"cpes":["cpe:2.3:a:publiccms:publiccms:*:*:*:*:*:*:*:*"],"modules":["Trade Payment Handler"],"product":"PublicCMS","vendor":"Sanluan","versions":[{"status":"affected","version":"4.0.202506.a"},{"status":"affected","version":"4.0.202506.b"},{"status":"affected","version":"4.0.202506.c"},{"status":"affected","version":"4.0.202506.d"},{"status":"affected","version":"5.202506.a"},{"status":"affected","version":"5.202506.b"},{"status":"affected","version":"5.202506.c"},{"status":"affected","version":"5.202506.d"},{"status":"affected","version":"6.202506.a"},{"status":"affected","version":"6.202506.b"},{"status":"affected","version":"6.202506.c"},{"status":"affected","version":"6.202506.d"}]}],"credits":[{"lang":"en","type":"reporter","value":"AliceS614 (VulDB User)"}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in Sanluan PublicCMS up to 4.0.202506.d/5.202506.d/6.202506.d. Impacted is the function Paid of the file publiccms-parent/publiccms-trade/src/main/java/com/publiccms/logic/service/trade/TradePaymentService.java of the component Trade Payment Handler. The manipulation of the argument paymentId leads to improper authorization. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitability is considered difficult. The exploit has been disclosed to the public and may be used. The identifier of the patch is 7329437e1288540336b1c66c114ed3363adcba02. It is recommended to apply a patch to fix this issue."}],"metrics":[{"cvssV4_0":{"baseScore":2.3,"baseSeverity":"LOW","vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","version":"4.0"}},{"cvssV3_1":{"baseScore":4.2,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L/E:P/RL:O/RC:C","version":"3.1"}},{"cvssV3_0":{"baseScore":4.2,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L/E:P/RL:O/RC:C","version":"3.0"}},{"cvssV2_0":{"baseScore":3.6,"vectorString":"AV:N/AC:H/Au:S/C:N/I:P/A:P/E:POC/RL:OF/RC:C","version":"2.0"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-285","description":"Improper Authorization","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-266","description":"Incorrect Privilege Assignment","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-02-23T09:22:54.760Z","orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB"},"references":[{"name":"VDB-344592 | Sanluan PublicCMS Trade Payment TradePaymentService.java paid improper authorization","tags":["vdb-entry","technical-description"],"url":"https://vuldb.com/?id.344592"},{"name":"VDB-344592 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"],"url":"https://vuldb.com/?ctiid.344592"},{"name":"Submit #743487 | PublicCMS 5 Improper Access Controls","tags":["third-party-advisory"],"url":"https://vuldb.com/?submit.743487"},{"tags":["issue-tracking"],"url":"https://github.com/sanluan/PublicCMS/issues/108"},{"tags":["exploit","issue-tracking"],"url":"https://github.com/sanluan/PublicCMS/issues/108#issue-3838143772"},{"tags":["patch"],"url":"https://github.com/sanluan/PublicCMS/commit/7329437e1288540336b1c66c114ed3363adcba02"},{"tags":["product"],"url":"https://github.com/sanluan/PublicCMS/"}],"tags":["x_open-source"],"timeline":[{"lang":"en","time":"2026-02-05T00:00:00.000Z","value":"Advisory disclosed"},{"lang":"en","time":"2026-02-05T01:00:00.000Z","value":"VulDB entry created"},{"lang":"en","time":"2026-02-18T01:03:36.000Z","value":"VulDB entry last update"}],"title":"Sanluan PublicCMS Trade Payment TradePaymentService.java paid improper authorization"}},"cveMetadata":{"assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","assignerShortName":"VulDB","cveId":"CVE-2026-2010","datePublished":"2026-02-06T08:02:09.018Z","dateReserved":"2026-02-05T19:24:59.797Z","dateUpdated":"2026-02-23T09:22:54.760Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-02-06 08:15:54","lastModifiedDate":"2026-04-29 01:00:01","problem_types":["CWE-266","CWE-285","CWE-639","CWE-285 Improper Authorization","CWE-266 Incorrect Privilege Assignment"],"metrics":{"cvssMetricV40":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":1.3,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"HIGH","attackRequirements":"NONE","privilegesRequired":"LOW","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"LOW","vulnAvailabilityImpact":"LOW","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"PROOF_OF_CONCEPT","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L","baseScore":4.2,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":1.6,"impactScore":2.5},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L","baseScore":4.2,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":1.6,"impactScore":2.5}],"cvssMetricV2":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:S/C:N/I:P/A:P","baseScore":3.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:publiccms:publiccms:*:*:*:*:*:*:*:*","versionEndIncluding":"4.0.202506.d","matchCriteriaId":"B3C8055A-B1BA-4C2A-BA25-1F511ED90DA9"},{"vulnerable":true,"criteria":"cpe:2.3:a:publiccms:publiccms:*:*:*:*:*:*:*:*","versionStartIncluding":"5.202302.a","versionEndIncluding":"5.202506.d","matchCriteriaId":"F86941E4-F491-49ED-A87C-47E9C323DE12"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"2010","Ordinal":"1","Title":"Sanluan PublicCMS Trade Payment TradePaymentService.java paid im","CVE":"CVE-2026-2010","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"2010","Ordinal":"1","NoteData":"A vulnerability has been found in Sanluan PublicCMS up to 4.0.202506.d/5.202506.d/6.202506.d. Impacted is the function Paid of the file publiccms-parent/publiccms-trade/src/main/java/com/publiccms/logic/service/trade/TradePaymentService.java of the component Trade Payment Handler. The manipulation of the argument paymentId leads to improper authorization. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitability is considered difficult. The exploit has been disclosed to the public and may be used. The identifier of the patch is 7329437e1288540336b1c66c114ed3363adcba02. It is recommended to apply a patch to fix this issue.","Type":"Description","Title":"Sanluan PublicCMS Trade Payment TradePaymentService.java paid im"}]}}}