Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| blinkospace | blinko | < 1.8.4 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Blinko < 1.8.4 contains a path traversal vulnerability caused by lack of permission checks and filtering on the temp/ path in the file server endpoint, letting unauthorized attackers read arbitrary files including backup files with user notes and tokens, exploit requires no special privileges. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2026/CVE-2026-23482.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2026-23481 | Blinko: Authenticated Arbitrary File Write - saveAdditionalDevFile | |
| CVE-2026-23484 | Blinko: Authenticated Arbitrary File Write - saveDevPlugin | |
| CVE-2026-23480 | Blinko: Low Privilege User Privilege Escalation - upsertUser Endpoint | |
| CVE-2026-23483 | Blinko: Unauthorized Arbitrary File Read - /plugins | |
| CVE-2026-23488 | Blinko: multiple interfaces in the comment feature allow unauthorized access | |
| CVE-2026-23486 | Blinko: Unauthorized User Information Leak | |
| CVE-2026-23485 | Blinko: Unauthorized Path Traversal File Enumeration - music-metadata | |
| CVE-2026-23487 | Blinko: IDOR - user.detail Endpoint Leaks Superadmin Token | |
| CVE-2026-23882 | Blinko: Admin RCE - MCP Server Command Injection |
No comments yet