PatchSiren

Sanluan CVE debriefs

These pages are published after PatchSiren validates generated defensive summaries against stored public CVE and source evidence.

LOW Sanluan CVE published 2026-05-17

CVE-2026-8740

CVE-2026-8740 is a remotely reachable flaw described for PublicCMS 5.202506.d. The affected execute() path in TemplateResultDirective can be manipulated through templateContent, causing improper neutralization of template-engine special elements. The supplied record says the exploit has been published and that early vendor outreach received no response.

MEDIUM Sanluan CVE published 2026-05-17

CVE-2026-8739

CVE-2026-8739 describes a remote flaw in Sanluan PublicCMS 5.202506.d where the getSignKey function in SafeConfigComponent.java can be manipulated via the privatefile_key argument to cause use of a hard-coded cryptographic key. The supplied source also states that an exploit is public and that the vendor was contacted early but did not respond. NVD/CVSS data in the source rates the issue as medium severit [truncated]

MEDIUM Sanluan CVE published 2026-05-17

CVE-2026-8738

CVE-2026-8738 describes a remotely exploitable business-logic weakness in Sanluan PublicCMS 5.202506.d affecting the trade payment flow. The supplied record points to pay() methods in TradeOrderController, TradePaymentController, and AccountGatewayComponent. The CVSS vector indicates no confidentiality impact and low integrity/availability impact, but the issue is still important because it touches paymen [truncated]

MEDIUM Sanluan CVE published 2026-05-17

CVE-2026-8737

CVE-2026-8737 describes a remote authentication weakness in Sanluan PublicCMS 5.202506.d affecting the TradeAddressListDirective execute path. According to the supplied record, manipulating the userId/id argument can lead to missing authentication, which may expose trade address query handling to unauthenticated access. The issue is rated medium by CVSS, but the supplied description also says a public exp [truncated]