xiaoheiFS is a self-hosted financial and operational system for cloud service businesses. In versions up to and including 0.3.15, the standard plugin system allows admins to upload a ZIP file containing a binary and a `manifest.json`. The server trusts the `binaries` field in the manifest and executes the specified file without any validation of its contents or behavior, leading to Remote Code Execution (RCE). Version 0.4.0 fixes the issue.
History

Wed, 18 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 18 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Danvei233
Danvei233 xiaoheifs
Vendors & Products Danvei233
Danvei233 xiaoheifs

Wed, 18 Mar 2026 01:00:00 +0000

Type Values Removed Values Added
Description xiaoheiFS is a self-hosted financial and operational system for cloud service businesses. In versions up to and including 0.3.15, the standard plugin system allows admins to upload a ZIP file containing a binary and a `manifest.json`. The server trusts the `binaries` field in the manifest and executes the specified file without any validation of its contents or behavior, leading to Remote Code Execution (RCE). Version 0.4.0 fixes the issue.
Title xiaoheiFS Vulnerable to RCE via Unrestricted Plugin Installation (Manifest Manipulation)
Weaknesses CWE-434
CWE-78
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2026-03-18T00:41:35.055Z

Updated: 2026-03-18T14:34:38.632Z

Reserved: 2026-03-02T21:43:19.926Z

Link: CVE-2026-28673

cve-icon Vulnrichment

Updated: 2026-03-18T14:34:28.838Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-18T01:16:05.117

Modified: 2026-03-18T15:16:29.583

Link: CVE-2026-28673

cve-icon Redhat

No data.