Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26336: CWE-863 Incorrect Authorization in Hyland Alfresco Enterprise

0
High
VulnerabilityCVE-2026-26336cvecve-2026-26336cwe-863
Published: Thu Feb 19 2026 (02/19/2026, 15:56:25 UTC)
Source: CVE Database V5
Vendor/Project: Hyland
Product: Alfresco Enterprise

Description

Hyland Alfresco allows unauthenticated attackers to read arbitrary files from protected directories (like WEB-INF) via the "/share/page/resource/" endpoint, thus leading to the disclosure of sensitive configuration files.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 00:37:30 UTC

Technical Analysis

CVE-2026-26336 is an incorrect authorization vulnerability (CWE-863) in Hyland Alfresco Enterprise, affecting versions 7.4.0, 23.6.0, and 25.1.0. The flaw exists in the handling of requests to the /share/page/resource/ endpoint, which improperly allows unauthenticated attackers to read arbitrary files from protected directories, including sensitive configuration files located in directories like WEB-INF. This endpoint fails to enforce proper access controls, enabling attackers to bypass authorization checks and retrieve files that should be inaccessible. The vulnerability is exploitable remotely without any authentication or user interaction, increasing its risk profile. The disclosed configuration files may contain sensitive information such as database credentials, API keys, or internal system details that could facilitate further attacks or system compromise. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N) indicates network attack vector, low complexity, no privileges or user interaction required, and high confidentiality impact, with no impact on integrity or availability. No patches or known exploits are currently reported, but the vulnerability is publicly disclosed and should be treated as a critical risk. The issue stems from improper authorization logic within the Alfresco web application framework, highlighting the need for secure coding practices and rigorous access control enforcement in web endpoints.

Potential Impact

The impact of CVE-2026-26336 is significant for organizations using affected versions of Hyland Alfresco Enterprise. Unauthorized disclosure of sensitive configuration files can lead to exposure of critical information such as database credentials, encryption keys, and internal system configurations. This information can be leveraged by attackers to escalate privileges, move laterally within networks, or launch further targeted attacks such as data exfiltration or ransomware. Since the vulnerability requires no authentication and can be exploited remotely, it increases the attack surface considerably, especially for internet-facing Alfresco deployments. Organizations handling sensitive or regulated data are at heightened risk of compliance violations and reputational damage if exploited. The vulnerability does not directly impact system integrity or availability but compromises confidentiality, which can have cascading effects on overall security posture. The lack of known exploits in the wild currently provides a window for proactive mitigation, but the public disclosure increases the likelihood of future exploitation attempts.

Mitigation Recommendations

1. Apply patches or updates from Hyland as soon as they become available to address the authorization flaw in the /share/page/resource/ endpoint. 2. Until patches are released, implement strict network-level access controls to restrict access to Alfresco web interfaces, especially the vulnerable endpoint, limiting it to trusted internal networks or VPN users only. 3. Deploy web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the /share/page/resource/ path or attempts to access protected directories like WEB-INF. 4. Conduct thorough audits of Alfresco server configurations and logs to identify any unauthorized access attempts or anomalous file retrieval activities. 5. Review and harden file system permissions on Alfresco servers to minimize exposure of sensitive configuration files. 6. Employ intrusion detection/prevention systems (IDS/IPS) to monitor for exploitation attempts. 7. Educate security teams and administrators about this vulnerability to ensure rapid response and incident handling. 8. Consider isolating Alfresco servers in segmented network zones to limit lateral movement if compromise occurs. 9. Regularly back up configuration and content data securely to enable recovery in case of compromise. 10. Monitor threat intelligence feeds for emerging exploit techniques targeting this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-02-13T17:28:43.052Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69973b6be884a8a4cb409748

Added to database: 2/19/2026, 4:33:47 PM

Last enriched: 3/24/2026, 12:37:30 AM

Last updated: 4/6/2026, 7:54:59 PM

Views: 101

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses