Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
ClickFix Integrates Old Open-Source Python S Evolves SOCKS5
May 13, 2026
Critical SandboxJS Escape Vulnerability Allows Host Takeover
May 13, 2026
iOS 26.5 Brings End-to-end Encrypted RCS Messaging Between iPhone
May 13, 2026
Home/CyberSecurity News/Critical ShowDoc RCE Vulnerability Actively Explo Exploited Wild
CyberSecurity News

Critical ShowDoc RCE Vulnerability Actively Explo Exploited Wild

A critical vulnerability in ShowDoc, a popular online document-sharing and collaboration tool used by IT teams worldwide, is currently under active exploitation by threat actors. Tracked under the...

Sarah simpson
Sarah simpson
April 14, 2026 2 Min Read
6 0

A critical vulnerability in ShowDoc, a popular online document-sharing and collaboration tool used by IT teams worldwide, is currently under active exploitation by threat actors.

Tracked under the identifier CNVD-2020-26585, this severe security flaw allows unauthenticated remote attackers to upload malicious files and execute arbitrary code on vulnerable servers.

Because ShowDoc often houses sensitive internal documentation and API specifications, a successful breach can give attackers a significant foothold in an organization’s internal network.

ShowDoc RCE Vulnerability

The vulnerability stems from an unrestricted file upload mechanism in ShowDoc versions before 2.8.7. The core issue lies in how the application processes incoming file uploads through its image upload API endpoint.

PHP file path will be exposed in the response(source :github)
PHP file path will be exposed in the response(source :Vulhub)

Threat actors can bypass standard security filters entirely, requiring no prior authentication or system privileges to deliver a malicious payload directly to the server infrastructure.

Security researchers from the Vulhub project have demonstrated that the exploit requires only a single, specially crafted HTTP POST request.

By targeting the /index.php?s=/home/page/uploadImg endpoint, attackers can force the server to accept executable PHP scripts instead of standard image formats.

  • The exploit manipulates the content disposition header by injecting specific characters into the filename, such as test.<>php, to evade basic extension validation.
  • Attackers embed a simple webshell or PHP execution command within the raw text of the uploaded multipart form data.
  • Once the server successfully processes the malicious request, it responds with the direct URL to the newly uploaded PHP file.
  • Navigating to this generated address executes the injected script with the privileges of the web server, granting the attacker full remote code execution capabilities.
phpinfo() executed successfully(source : github)
phpinfo() executed successfully (source : Vulhub)

Organizations relying on ShowDoc must take immediate action to secure their documentation environments against this active threat.

Widely available exploit code makes unpatched servers easy targets for automated scanning and attacks, as highlighted in a VulnCheck researcher report on GitHub.

  • Administrators must upgrade their ShowDoc instances to version 2.8.7 or later to apply the official security patch for this flaw.
  • Security teams should aggressively review web server access logs for suspicious POST requests targeting the image upload directory.
  • Network defenders must restrict access to internal documentation servers to prevent them from being directly exposed to the public internet.
  • Organizations should configure Web Application Firewalls to inspect incoming traffic and block malformed file upload requests containing executable script extensions.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackBreachExploitPatchSecurityThreatVulnerability

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Mirax Android RAT Converts Infected Phones to Proxy Nodes

Next Post

Synology SSL VPN Flaws Expose Sensitive Files Client Vulnerabilities

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Microsoft Releases Windows 11 Cumulative Update 25H
May 13, 2026
Discover the Top 10 Best Data Loss Prevention Software
May 13, 2026
Microsoft Teams Vulnerability Enables Spoofing Attacks
May 13, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us