CVE-2026-2701
RCE vulnerability in Progress ShareFile Storage Zones Controller (SZC)
Description
Authenticated user can upload a malicious file to the server and execute it, which leads to remote code execution.
INFO
Published Date :
April 2, 2026, 2:16 p.m.
Last Modified :
April 21, 2026, 12:28 a.m.
Remotely Exploit :
Yes !
Source :
[email protected]
Affected Products
The following products are affected by CVE-2026-2701
vulnerability.
Even if cvefeed.io is aware of the exact versions of the
products
that
are
affected, the information is not represented in the table below.
CVSS Scores
| Score | Version | Severity | Vector | Exploitability Score | Impact Score | Source |
|---|---|---|---|---|---|---|
| CVSS 3.1 | CRITICAL | f9fea0b6-671e-4eea-8fde-31911902ae05 | ||||
| CVSS 3.1 | CRITICAL | [email protected] | ||||
| CVSS 3.1 | CRITICAL | MITRE-CVE | ||||
| CVSS 3.1 | HIGH | [email protected] |
Solution
- Validate all uploaded files server-side.
- Implement strict access controls for uploads.
- Remove unnecessary file execution permissions.
Public PoC/Exploit Available at Github
CVE-2026-2701 has a 2 public
PoC/Exploit available at Github.
Go to the Public Exploits tab to see the list.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2026-2701.
| URL | Resource |
|---|---|
| https://docs.sharefile.com/en-us/storage-zones-controller/5-0/security-vulnerability-feb26 | Vendor Advisory |
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2026-2701 is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2026-2701
weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
CVE-2026-2699
爬取secwiki和xuanwu.github.io/sec.today,分析安全信息站点、安全趋势、提取安全工作者账号(twitter,weixin,github等)
Python HTML
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2026-2701 vulnerability anywhere in the article.
-
CybersecurityNews
New Progress ShareFile Bugs Let Attackers Take Over Servers Without Logging In
A dangerous attack chain in Progress ShareFile that can allow attackers to take over exposed on-premises servers without first logging in. The issues affect customer-managed ShareFile Storage Zones Co ... Read more
-
security.nl
Progress ShareFile-servers via kritieke kwetsbaarheid volledig over te nemen
Onderzoekers waarschuwen voor twee kwetsbaarheden in Progress ShareFile die het voor ongeauthenticeerde aanvallers mogelijk maken om kwetsbare servers over te nemen. Progress werd begin februari door ... Read more
-
Daily CyberSecurity
Critical 9.8 CVSS RCE Vulnerabilities Exposed in Progress ShareFile
Image: watchTowr Labs A duo of severe security vulnerabilities has been uncovered in Progress ShareFile, a widely used managed file transfer solution. The flaws, discovered by the research team at wat ... Read more
-
The Hacker News
ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories
The latest ThreatsDay Bulletin is basically a cheat sheet for everything breaking on the internet right now. No corporate fluff or boring lectures here, just a quick and honest look at the messy reali ... Read more
The following table lists the changes that have been made to the
CVE-2026-2701 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
Initial Analysis by [email protected]
Apr. 21, 2026
Action Type Old Value New Value Added CVSS V3.1 AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Added CWE CWE-434 Added CPE Configuration OR *cpe:2.3:a:progress:sharefile_storage_zones_controller:*:*:*:*:*:*:*:* versions from (including) 5.0.0 up to (excluding) 5.12.4 Added Reference Type Progress Software Corporation: https://docs.sharefile.com/en-us/storage-zones-controller/5-0/security-vulnerability-feb26 Types: Vendor Advisory -
New CVE Received by [email protected]
Apr. 02, 2026
Action Type Old Value New Value Added Description Authenticated user can upload a malicious file to the server and execute it, which leads to remote code execution. Added CVSS V3.1 AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H Added CWE CWE-94 Added CWE CWE-78 Added CWE CWE-434 Added Reference https://docs.sharefile.com/en-us/storage-zones-controller/5-0/security-vulnerability-feb26