HomeWem-ProjectCVE-2026-22789

CVE-2026-22789

MEDIUM
5.4CVSS
Published: 2026-01-12
Updated: 2026-01-21
AI Analysis

Description

WebErpMesv2 is a Resource Management and Manufacturing execution system Web for industry. Prior to 1.19, WebErpMesv2 contains a file upload validation bypass vulnerability in multiple controllers that allows authenticated users to upload arbitrary files, including PHP scripts, leading to Remote Code Execution (RCE). This vulnerability is identical in nature to CVE-2025-52130 but exists in different code locations that were not addressed by the original fix. This vulnerability is fixed in 1.19.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Attack Vector
network
Complexity
low
Privileges
low
User Action
none
Scope
unchanged
Confidentiality
low
Integrity
low
Availability
none
Weaknesses
CWE-434CWE-616CWE-434

Metadata

Primary Vendor
WEM-PROJECT
Published
1/12/2026
Last Modified
1/21/2026
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

wem-project : wem

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2026-22789 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com