Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22783: CWE-434: Unrestricted Upload of File with Dangerous Type in dfir-iris iris-web

0
Critical
VulnerabilityCVE-2026-22783cvecve-2026-22783cwe-434cwe-915cwe-73
Published: Mon Jan 12 2026 (01/12/2026, 18:27:38 UTC)
Source: CVE Database V5
Vendor/Project: dfir-iris
Product: iris-web

Description

Iris is a web collaborative platform that helps incident responders share technical details during investigations. Prior to 2.4.24, the DFIR-IRIS datastore file management system has a vulnerability where mass assignment of the file_local_name field combined with path trust in the delete operation enables authenticated users to delete arbitrary filesystem paths. The vulnerability manifests through a three-step attack chain: authenticated users upload a file to the datastore, update the file's file_local_name field to point to an arbitrary filesystem path through mass assignment, then trigger the delete operation which removes the target file without path validation. This vulnerability is fixed in 2.4.24.

AI-Powered Analysis

AILast updated: 01/12/2026, 18:53:07 UTC

Technical Analysis

CVE-2026-22783 is a critical security vulnerability identified in the iris-web component of the dfir-iris platform, a collaborative tool used by incident responders to share investigation details. The vulnerability exists in versions prior to 2.4.24 and involves an unsafe file management mechanism in the datastore. Specifically, the file_local_name field can be mass assigned by an authenticated user, allowing them to set this field to an arbitrary filesystem path. When the delete operation is invoked, it trusts the file_local_name path without proper validation or sanitization, enabling deletion of arbitrary files or directories on the server. The attack chain requires three steps: first, an authenticated user uploads a file to the datastore; second, they update the file_local_name field to point to a target filesystem path; third, they trigger the delete operation, which removes the targeted file or directory. This leads to a loss of integrity and availability of critical files, potentially disrupting the platform’s operation or tampering with forensic data. The vulnerability is remotely exploitable over the network with low attack complexity, requiring only authenticated access and no user interaction. The CVSS v3.1 score is 9.6 (critical), reflecting the high impact on integrity and availability with network vector and low privileges required. The vulnerability is related to CWE-434 (Unrestricted Upload of File with Dangerous Type), CWE-915 (Improperly Controlled Modification of Object Prototype Attributes), and CWE-73 (External Control of File Name or Path). No known exploits are reported in the wild yet, but the severity and ease of exploitation make it a high-risk issue. The vendor has fixed the vulnerability in iris-web version 2.4.24.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the integrity and availability of their incident response infrastructure. Since iris-web is used to manage and share sensitive forensic data, arbitrary deletion of files could result in loss or tampering of critical investigation evidence, undermining incident response efforts and compliance with regulatory requirements such as GDPR. Disruption of the platform could delay or prevent timely response to security incidents, increasing exposure to further attacks. The vulnerability requires authenticated access, so insider threats or compromised user accounts could be leveraged to exploit it. Given the collaborative nature of iris-web, multiple users may have access, increasing the attack surface. Organizations relying on iris-web for digital forensics and incident management must consider the operational impact of potential data loss or service disruption. Additionally, the deletion of system or application files could lead to denial of service, requiring recovery efforts and causing downtime. The critical severity and network exploitability mean that attackers could weaponize this vulnerability to sabotage investigations or disrupt security operations across European entities.

Mitigation Recommendations

The primary mitigation is to upgrade iris-web to version 2.4.24 or later, where the vulnerability is fixed. Until patching is possible, organizations should restrict access to iris-web to trusted users only and enforce strict authentication and authorization controls to minimize the risk of exploitation by insiders or compromised accounts. Implement monitoring and alerting on file deletion operations within the iris-web datastore to detect suspicious activity. Employ network segmentation and firewall rules to limit access to the iris-web platform from untrusted networks. Conduct regular audits of user permissions and review logs for anomalous behavior related to file uploads and deletions. Consider deploying application-layer protections such as web application firewalls (WAFs) that can detect and block suspicious mass assignment or path manipulation attempts. Educate users about the risks of credential compromise and enforce strong password policies and multi-factor authentication to reduce the likelihood of unauthorized access. Finally, maintain regular backups of iris-web data and system files to enable recovery in case of malicious deletion.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-09T18:27:19.388Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69653fb6da2266e838f91b28

Added to database: 1/12/2026, 6:38:46 PM

Last enriched: 1/12/2026, 6:53:07 PM

Last updated: 1/13/2026, 8:01:31 AM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats