CVE-2026-2976

A weakness has been identified in FastApiAdmin up to 2.2.0. Affected by this issue is the function download_controller of the file /backend/app/api/v1/module_common/file/controller.py of the component Download Endpoint. This manipulation of the argument file_path causes information disclosure. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks.
References
Link Resource
https://github.com/CC-T-454455/Vulnerabilities/tree/master/fastapi-admin/vulnerability-2 Exploit Third Party Advisory
https://vuldb.com/?ctiid.347360 Permissions Required VDB Entry
https://vuldb.com/?id.347360 Third Party Advisory
https://vuldb.com/?submit.756089 Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fastapiadmin:fastapi-admin:2.0:*:*:*:*:*:*:*
cpe:2.3:a:fastapiadmin:fastapi-admin:2.1:*:*:*:*:*:*:*
cpe:2.3:a:fastapiadmin:fastapi-admin:2.2.0:*:*:*:*:*:*:*

History

24 Feb 2026, 15:50

Type Values Removed Values Added
CWE CWE-434
First Time Fastapiadmin fastapi-admin
Fastapiadmin
CPE cpe:2.3:a:fastapiadmin:fastapi-admin:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:fastapiadmin:fastapi-admin:2.0:*:*:*:*:*:*:*
cpe:2.3:a:fastapiadmin:fastapi-admin:2.1:*:*:*:*:*:*:*
References () https://github.com/CC-T-454455/Vulnerabilities/tree/master/fastapi-admin/vulnerability-2 - () https://github.com/CC-T-454455/Vulnerabilities/tree/master/fastapi-admin/vulnerability-2 - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.347360 - () https://vuldb.com/?ctiid.347360 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.347360 - () https://vuldb.com/?id.347360 - Third Party Advisory
References () https://vuldb.com/?submit.756089 - () https://vuldb.com/?submit.756089 - Third Party Advisory

23 Feb 2026, 18:13

Type Values Removed Values Added
Summary
  • (es) Se ha identificado una debilidad en FastApiAdmin hasta la versión 2.2.0. Está afectadapor este problema la función download_controller del archivo /backend/app/api/v1/module_common/file/controller.py del componente 'Download Endpoint'. Esta manipulación del argumento 'file_path' provoca una revelación de información. Es posible iniciar el ataque de forma remota. El exploit ha sido puesto a disposición del público y podría ser utilizado para ataques.

23 Feb 2026, 07:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-23 07:16

Updated : 2026-02-24 15:50


NVD link : CVE-2026-2976

Mitre link : CVE-2026-2976

CVE.ORG link : CVE-2026-2976


JSON object : View

Products Affected

fastapiadmin

  • fastapi-admin
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-284

Improper Access Control

CWE-434

Unrestricted Upload of File with Dangerous Type