CVE-2026-22783: CWE-434: Unrestricted Upload of File with Dangerous Type in dfir-iris iris-web
Iris is a web collaborative platform that helps incident responders share technical details during investigations. Prior to 2.4.24, the DFIR-IRIS datastore file management system has a vulnerability where mass assignment of the file_local_name field combined with path trust in the delete operation enables authenticated users to delete arbitrary filesystem paths. The vulnerability manifests through a three-step attack chain: authenticated users upload a file to the datastore, update the file's file_local_name field to point to an arbitrary filesystem path through mass assignment, then trigger the delete operation which removes the target file without path validation. This vulnerability is fixed in 2.4.24.
AI Analysis
Technical Summary
CVE-2026-22783 is a critical security vulnerability identified in the iris-web component of the dfir-iris platform, a collaborative tool used by incident responders to share investigation details. The vulnerability exists in versions prior to 2.4.24 and involves an unsafe file management mechanism in the datastore. Specifically, the file_local_name field can be mass assigned by an authenticated user, allowing them to set this field to an arbitrary filesystem path. When the delete operation is invoked, it trusts the file_local_name path without proper validation or sanitization, enabling deletion of arbitrary files or directories on the server. The attack chain requires three steps: first, an authenticated user uploads a file to the datastore; second, they update the file_local_name field to point to a target filesystem path; third, they trigger the delete operation, which removes the targeted file or directory. This leads to a loss of integrity and availability of critical files, potentially disrupting the platform’s operation or tampering with forensic data. The vulnerability is remotely exploitable over the network with low attack complexity, requiring only authenticated access and no user interaction. The CVSS v3.1 score is 9.6 (critical), reflecting the high impact on integrity and availability with network vector and low privileges required. The vulnerability is related to CWE-434 (Unrestricted Upload of File with Dangerous Type), CWE-915 (Improperly Controlled Modification of Object Prototype Attributes), and CWE-73 (External Control of File Name or Path). No known exploits are reported in the wild yet, but the severity and ease of exploitation make it a high-risk issue. The vendor has fixed the vulnerability in iris-web version 2.4.24.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the integrity and availability of their incident response infrastructure. Since iris-web is used to manage and share sensitive forensic data, arbitrary deletion of files could result in loss or tampering of critical investigation evidence, undermining incident response efforts and compliance with regulatory requirements such as GDPR. Disruption of the platform could delay or prevent timely response to security incidents, increasing exposure to further attacks. The vulnerability requires authenticated access, so insider threats or compromised user accounts could be leveraged to exploit it. Given the collaborative nature of iris-web, multiple users may have access, increasing the attack surface. Organizations relying on iris-web for digital forensics and incident management must consider the operational impact of potential data loss or service disruption. Additionally, the deletion of system or application files could lead to denial of service, requiring recovery efforts and causing downtime. The critical severity and network exploitability mean that attackers could weaponize this vulnerability to sabotage investigations or disrupt security operations across European entities.
Mitigation Recommendations
The primary mitigation is to upgrade iris-web to version 2.4.24 or later, where the vulnerability is fixed. Until patching is possible, organizations should restrict access to iris-web to trusted users only and enforce strict authentication and authorization controls to minimize the risk of exploitation by insiders or compromised accounts. Implement monitoring and alerting on file deletion operations within the iris-web datastore to detect suspicious activity. Employ network segmentation and firewall rules to limit access to the iris-web platform from untrusted networks. Conduct regular audits of user permissions and review logs for anomalous behavior related to file uploads and deletions. Consider deploying application-layer protections such as web application firewalls (WAFs) that can detect and block suspicious mass assignment or path manipulation attempts. Educate users about the risks of credential compromise and enforce strong password policies and multi-factor authentication to reduce the likelihood of unauthorized access. Finally, maintain regular backups of iris-web data and system files to enable recovery in case of malicious deletion.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden, Poland, Finland
CVE-2026-22783: CWE-434: Unrestricted Upload of File with Dangerous Type in dfir-iris iris-web
Description
Iris is a web collaborative platform that helps incident responders share technical details during investigations. Prior to 2.4.24, the DFIR-IRIS datastore file management system has a vulnerability where mass assignment of the file_local_name field combined with path trust in the delete operation enables authenticated users to delete arbitrary filesystem paths. The vulnerability manifests through a three-step attack chain: authenticated users upload a file to the datastore, update the file's file_local_name field to point to an arbitrary filesystem path through mass assignment, then trigger the delete operation which removes the target file without path validation. This vulnerability is fixed in 2.4.24.
AI-Powered Analysis
Technical Analysis
CVE-2026-22783 is a critical security vulnerability identified in the iris-web component of the dfir-iris platform, a collaborative tool used by incident responders to share investigation details. The vulnerability exists in versions prior to 2.4.24 and involves an unsafe file management mechanism in the datastore. Specifically, the file_local_name field can be mass assigned by an authenticated user, allowing them to set this field to an arbitrary filesystem path. When the delete operation is invoked, it trusts the file_local_name path without proper validation or sanitization, enabling deletion of arbitrary files or directories on the server. The attack chain requires three steps: first, an authenticated user uploads a file to the datastore; second, they update the file_local_name field to point to a target filesystem path; third, they trigger the delete operation, which removes the targeted file or directory. This leads to a loss of integrity and availability of critical files, potentially disrupting the platform’s operation or tampering with forensic data. The vulnerability is remotely exploitable over the network with low attack complexity, requiring only authenticated access and no user interaction. The CVSS v3.1 score is 9.6 (critical), reflecting the high impact on integrity and availability with network vector and low privileges required. The vulnerability is related to CWE-434 (Unrestricted Upload of File with Dangerous Type), CWE-915 (Improperly Controlled Modification of Object Prototype Attributes), and CWE-73 (External Control of File Name or Path). No known exploits are reported in the wild yet, but the severity and ease of exploitation make it a high-risk issue. The vendor has fixed the vulnerability in iris-web version 2.4.24.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the integrity and availability of their incident response infrastructure. Since iris-web is used to manage and share sensitive forensic data, arbitrary deletion of files could result in loss or tampering of critical investigation evidence, undermining incident response efforts and compliance with regulatory requirements such as GDPR. Disruption of the platform could delay or prevent timely response to security incidents, increasing exposure to further attacks. The vulnerability requires authenticated access, so insider threats or compromised user accounts could be leveraged to exploit it. Given the collaborative nature of iris-web, multiple users may have access, increasing the attack surface. Organizations relying on iris-web for digital forensics and incident management must consider the operational impact of potential data loss or service disruption. Additionally, the deletion of system or application files could lead to denial of service, requiring recovery efforts and causing downtime. The critical severity and network exploitability mean that attackers could weaponize this vulnerability to sabotage investigations or disrupt security operations across European entities.
Mitigation Recommendations
The primary mitigation is to upgrade iris-web to version 2.4.24 or later, where the vulnerability is fixed. Until patching is possible, organizations should restrict access to iris-web to trusted users only and enforce strict authentication and authorization controls to minimize the risk of exploitation by insiders or compromised accounts. Implement monitoring and alerting on file deletion operations within the iris-web datastore to detect suspicious activity. Employ network segmentation and firewall rules to limit access to the iris-web platform from untrusted networks. Conduct regular audits of user permissions and review logs for anomalous behavior related to file uploads and deletions. Consider deploying application-layer protections such as web application firewalls (WAFs) that can detect and block suspicious mass assignment or path manipulation attempts. Educate users about the risks of credential compromise and enforce strong password policies and multi-factor authentication to reduce the likelihood of unauthorized access. Finally, maintain regular backups of iris-web data and system files to enable recovery in case of malicious deletion.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-09T18:27:19.388Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69653fb6da2266e838f91b28
Added to database: 1/12/2026, 6:38:46 PM
Last enriched: 1/12/2026, 6:53:07 PM
Last updated: 1/13/2026, 8:01:31 AM
Views: 23
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-41717: CWE-94 Improper Control of Generation of Code ('Code Injection') in Phoenix Contact TC ROUTER 3002T-3G
HighCVE-2025-14829: CWE-862 Missing Authorization in E-xact | Hosted Payment |
CriticalCVE-2025-10915: CWE-862 Missing Authorization in Dreamer Blog
HighCVE-2026-22837
LowCVE-2026-22836
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.