VYPR
Medium severity5.3NVD Advisory· Published May 17, 2026· Updated May 18, 2026

CVE-2026-8739

CVE-2026-8739

Description

A vulnerability was detected in Sanluan PublicCMS 5.202506.d. The affected element is the function getSignKey of the file publiccms-core/src/main/java/com/publiccms/logic/component/config/SafeConfigComponent.java. The manipulation of the argument privatefile_key results in use of hard-coded cryptographic key . The attack can be executed remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

PublicCMS 5.202506.d uses a hard-coded default signing key for private file URLs, allowing unauthenticated attackers to forge signatures and download private files.

Vulnerability

A cryptographic design flaw exists in PublicCMS 5.202506.d within the SafeConfigComponent.getSignKey function (publiccms-core/src/main/java/com/publiccms/logic/component/config/SafeConfigComponent.java). When the privatefile_key configuration is not set, the function uses a deterministic fallback key derived from siteId, CMS_FILEPATH.hashCode(), and clusterId. The clusterId value is exposed through the unauthenticated endpoint /api/directive/tools/version, making the effective signing secret externally derivable [1].

Exploitation

An unauthenticated attacker can obtain the cluster value by sending a GET request to /api/directive/tools/version. Using the known derivation algorithm, the attacker can compute the default signing key offline. With this key, the attacker can forge a valid sign parameter for any private file path and expiry value, then download the file via the /file/private endpoint without authentication [1].

Impact

Successful exploitation allows an unauthenticated attacker to download any private file protected by the signed URL mechanism. This results in unauthorized information disclosure of files that were intended to be restricted to authenticated users or specific signed requests [1].

Mitigation

The vendor was contacted but did not respond, and no official patch has been released as of the publication date. As a workaround, administrators should configure a strong, random privatefile_key in the application configuration to override the default. Additionally, consider restricting access to the /api/directive/tools/version endpoint or removing it if not required [1].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.