Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26002: CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') in OSC ondemand

0
Medium
VulnerabilityCVE-2026-26002cvecve-2026-26002cwe-74
Published: Wed Mar 04 2026 (03/04/2026, 22:05:28 UTC)
Source: CVE Database V5
Vendor/Project: OSC
Product: ondemand

Description

CVE-2026-26002 is a medium severity injection vulnerability in the Files application of Open OnDemand versions prior to 4. 0. 9 and between 4. 1. 0 and 4. 1. 3. It involves improper neutralization of special elements in output used by a downstream component, allowing malicious input when navigating directories. Exploitation requires network access and low privileges but no user interaction. The vulnerability can impact confidentiality, integrity, and availability of HPC portal systems.

AI-Powered Analysis

AILast updated: 03/04/2026, 22:33:41 UTC

Technical Analysis

CVE-2026-26002 is an injection vulnerability classified under CWE-74, affecting the Files application component of Open OnDemand, an open-source high-performance computing (HPC) portal. The vulnerability arises from improper neutralization of special elements in output that is subsequently processed by a downstream component. Specifically, when users navigate directories within the Files application in versions prior to 4.0.9 and between 4.1.0 and 4.1.3, maliciously crafted input can be injected, potentially leading to unintended command execution or manipulation of system behavior. This vulnerability does not require user interaction and can be exploited remotely over the network with low privileges, increasing its risk profile. The CVSS 4.0 base score is 6.3, reflecting medium severity, with high impact on confidentiality, integrity, and availability, but no scope change or authentication bypass. The issue has been addressed in versions 4.0.9 and 4.1.3 by implementing proper input validation and output encoding to neutralize special characters before they reach downstream components. No public exploits or active exploitation have been reported to date, but the vulnerability poses a risk to HPC environments relying on affected Open OnDemand versions.

Potential Impact

The vulnerability could allow attackers to inject malicious input that downstream components interpret in unintended ways, potentially leading to unauthorized access, data leakage, or disruption of HPC portal services. This can compromise confidentiality by exposing sensitive HPC data or user information, integrity by altering data or commands, and availability by causing service interruptions or crashes. Given Open OnDemand's role as a gateway to HPC resources, exploitation could also facilitate lateral movement within HPC clusters or escalate privileges indirectly. Organizations relying on vulnerable versions may face operational disruptions, data breaches, or loss of trust from research partners. The lack of required user interaction and network accessibility increases the likelihood of exploitation attempts, especially in environments with exposed HPC portals.

Mitigation Recommendations

Organizations should immediately upgrade Open OnDemand installations to versions 4.0.9 or 4.1.3 or later to apply the official patches. In addition to patching, implement strict input validation and output encoding on all user-supplied data, especially directory navigation inputs, to prevent injection of special characters. Employ network segmentation and firewall rules to restrict access to HPC portals to trusted users and networks. Monitor logs for unusual directory navigation patterns or injection attempts. Conduct regular security assessments and code reviews focusing on input handling in web applications. Consider deploying web application firewalls (WAFs) with custom rules to detect and block injection payloads targeting this vulnerability. Maintain an incident response plan tailored for HPC environments to quickly address potential exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-09T17:41:55.859Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a8afacd1a09e29cb7ac718

Added to database: 3/4/2026, 10:18:20 PM

Last enriched: 3/4/2026, 10:33:41 PM

Last updated: 3/4/2026, 11:22:54 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses