Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| blinkospace | blinko | < 1.8.4 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Blinko <= 1.8.4 contains an information disclosure caused by a publicly accessible endpoint exposing user information including usernames, roles, and account creation dates, letting remote attackers access sensitive user data, exploit requires no special privileges. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2026/CVE-2026-23486.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2026-23481 | Blinko: Authenticated Arbitrary File Write - saveAdditionalDevFile | |
| CVE-2026-23484 | Blinko: Authenticated Arbitrary File Write - saveDevPlugin | |
| CVE-2026-23480 | Blinko: Low Privilege User Privilege Escalation - upsertUser Endpoint | |
| CVE-2026-23483 | Blinko: Unauthorized Arbitrary File Read - /plugins | |
| CVE-2026-23482 | Blinko: Unauthorized Arbitrary File Read - /api/file/temp | |
| CVE-2026-23488 | Blinko: multiple interfaces in the comment feature allow unauthorized access | |
| CVE-2026-23485 | Blinko: Unauthorized Path Traversal File Enumeration - music-metadata | |
| CVE-2026-23487 | Blinko: IDOR - user.detail Endpoint Leaks Superadmin Token | |
| CVE-2026-23882 | Blinko: Admin RCE - MCP Server Command Injection |
No comments yet