Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26101: CWE-732 Incorrect Permission Assignment for Critical Resource in Owl opds

0
High
VulnerabilityCVE-2026-26101cvecve-2026-26101cwe-732
Published: Fri Feb 20 2026 (02/20/2026, 16:55:50 UTC)
Source: CVE Database V5
Vendor/Project: Owl
Product: opds

Description

Incorrect Permission Assignment for Critical Resource in Owl opds 2.2.0.4 allows File Manipulation via a crafted network request.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 14:09:02 UTC

Technical Analysis

CVE-2026-26101 is a vulnerability identified in Owl opds version 2.2.0.4, classified under CWE-732, which pertains to incorrect permission assignment for critical resources. This vulnerability arises when the application improperly assigns permissions to sensitive files or resources, allowing an attacker with limited privileges (PR:L) to perform unauthorized file manipulation through crafted network requests. The CVSS 4.0 vector indicates that the attack requires local access (AV:L), low attack complexity (AC:L), no authentication (AT:N), and no user interaction (UI:N). The vulnerability impacts confidentiality, integrity, and availability at a high level (VC:H, VI:H, VA:H), meaning an attacker can potentially read, modify, or delete critical files. The scope is unchanged (S:U), and no security requirements such as integrity or availability protections are bypassed (SI:N, SA:N). Although no exploits are currently known in the wild and no patches have been released, the vulnerability poses a significant risk due to the critical nature of the resource permissions involved. The flaw could be exploited in environments where an attacker has limited local access, such as through compromised user accounts or insider threats, enabling unauthorized file operations that could disrupt services or leak sensitive data.

Potential Impact

The vulnerability can lead to unauthorized file manipulation, which threatens the confidentiality, integrity, and availability of systems running Owl opds 2.2.0.4. Attackers with limited privileges can exploit this flaw to modify or delete critical files, potentially disrupting service operations or causing data breaches. This can result in downtime, loss of sensitive information, and damage to organizational reputation. Since the vulnerability requires local access but no user interaction or elevated authentication, it increases the risk in environments where attackers can gain limited footholds, such as through phishing or insider threats. The high CVSS score reflects the severe impact on critical resources, making it a priority for organizations relying on Owl opds for document or data management. The absence of known exploits currently provides a window for proactive mitigation before widespread exploitation occurs.

Mitigation Recommendations

Organizations should immediately audit and restrict permissions on critical resources within Owl opds installations to ensure least privilege principles are enforced. Network segmentation should be implemented to limit local access to trusted users and systems only. Monitoring and logging of file access and modification events related to Owl opds resources should be enhanced to detect suspicious activity early. Until an official patch is released, consider deploying host-based intrusion prevention systems (HIPS) or endpoint detection and response (EDR) solutions to block unauthorized file operations. Regularly update and review user privileges to minimize the risk of privilege escalation. Additionally, conduct penetration testing focusing on permission configurations to identify and remediate similar misconfigurations. Engage with the vendor for timely patch releases and apply updates promptly once available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Nozomi
Date Reserved
2026-02-11T09:59:47.767Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6998c9e6be58cf853bab77ce

Added to database: 2/20/2026, 8:53:58 PM

Last enriched: 2/28/2026, 2:09:02 PM

Last updated: 4/7/2026, 1:38:16 PM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses