Shandong Hoteam InforCenter PLM Unrestricted Upload Vulnerability (CVE-2026-5261)
CVE-2026-5261 is an unrestricted file upload vulnerability in Shandong Hoteam InforCenter PLM up to version 8.3.8, allowing remote attackers to execute arbitrary code by uploading malicious files via the uploadFileToIIS function.
A critical vulnerability, CVE-2026-5261, has been identified in Shandong Hoteam InforCenter PLM software, specifically in versions up to 8.3.8. This vulnerability resides in the uploadFileToIIS function located within the /Base/BaseHandler.ashx file. The vulnerability allows unauthenticated remote attackers to upload arbitrary files to the server due to a lack of proper input validation and access controls. The exploit is publicly available, increasing the risk of widespread exploitation. The vendor was notified but did not respond. This vulnerability poses a significant threat, as successful exploitation can lead to arbitrary code execution, data breaches, and complete system compromise.
Attack Chain
- An attacker identifies a vulnerable Shandong Hoteam InforCenter PLM instance running version 8.3.8 or earlier.
- The attacker crafts a malicious HTTP request targeting the
/Base/BaseHandler.ashxendpoint, specifically invoking theuploadFileToIISfunction. - The attacker includes a
Fileparameter in the request, containing a payload such as a webshell or other executable code disguised as a seemingly benign file type. - Due to the unrestricted file upload vulnerability (CVE-2026-5261), the server accepts and stores the attacker’s malicious file without proper validation.
- The attacker determines the final storage location of the uploaded file on the server’s file system.
- The attacker crafts a new HTTP request to access the uploaded file, triggering its execution.
- The attacker gains a foothold on the server and can execute arbitrary commands.
- The attacker can then escalate privileges, move laterally within the network, exfiltrate sensitive data, or cause other damage to the system.
Impact
Successful exploitation of CVE-2026-5261 allows a remote, unauthenticated attacker to upload arbitrary files to the vulnerable server. This can lead to arbitrary code execution and complete system compromise, potentially impacting all data and processes managed by the PLM software. There is currently no information about the number of affected systems or specific industries targeted, but the availability of a public exploit increases the potential for widespread attacks. Successful exploitation can result in data breaches, financial losses, and reputational damage.
Recommendation
- Apply available patches or upgrade to a secure version of Shandong Hoteam InforCenter PLM to remediate CVE-2026-5261.
- Implement a web application firewall (WAF) rule to block requests with suspicious file extensions or content types being uploaded to
/Base/BaseHandler.ashxto mitigate exploitation attempts. - Monitor web server logs for suspicious POST requests to
/Base/BaseHandler.ashxwith unusually large file sizes or unusual file extensions as indicated in the “Detect Suspicious PLM Uploads” Sigma rule. - Implement file integrity monitoring (FIM) on the web server’s upload directories to detect unauthorized file creations or modifications to identify successful exploitation.
Detection coverage 2
Detect Suspicious PLM Uploads
highDetects suspicious POST requests to the uploadFileToIIS function in Hoteam PLM that might indicate an attempted exploit of CVE-2026-5261.
Detect PLM Webshell Upload
criticalDetects web requests to webshells uploaded via CVE-2026-5261
Detection queries are kept inside the platform. Get full rules →