Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26337: CWE-36 Absolute Path Traversal in Hyland Alfresco Transformation Service (Enterprise)

0
High
VulnerabilityCVE-2026-26337cvecve-2026-26337cwe-36
Published: Thu Feb 19 2026 (02/19/2026, 17:01:25 UTC)
Source: CVE Database V5
Vendor/Project: Hyland
Product: Alfresco Transformation Service (Enterprise)

Description

Hyland Alfresco Transformation Service allows unauthenticated attackers to achieve both arbitrary file read and server-side request forgery through the absolute path traversal.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 14:26:34 UTC

Technical Analysis

CVE-2026-26337 is an absolute path traversal vulnerability identified in the Hyland Alfresco Transformation Service (Enterprise edition). This vulnerability, classified under CWE-36, allows unauthenticated attackers to manipulate file path inputs to access arbitrary files on the server filesystem. The vulnerability also enables server-side request forgery (SSRF), allowing attackers to make unauthorized requests from the vulnerable server to internal or external systems. The root cause is insufficient validation and sanitization of user-supplied file paths, permitting traversal sequences (e.g., ../) to escape the intended directory boundaries. The vulnerability requires no authentication or user interaction, making it remotely exploitable over the network. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N) reflects network attack vector, low attack complexity, no privileges or user interaction required, and high confidentiality impact with limited integrity impact. While no patches are currently linked, the vendor and users must prioritize remediation once available. The vulnerability can lead to disclosure of sensitive configuration files, credentials, or internal data, and SSRF can be leveraged for further internal network attacks or pivoting.

Potential Impact

The vulnerability poses a significant risk to organizations using Hyland Alfresco Transformation Service (Enterprise), potentially exposing sensitive files such as configuration files, credentials, or proprietary data. Unauthorized file reads compromise confidentiality and may facilitate further attacks, including privilege escalation or lateral movement. SSRF capabilities allow attackers to probe internal networks, access internal services, or bypass firewall restrictions, increasing the attack surface. The lack of authentication and user interaction requirements means attackers can exploit this remotely and at scale. This can lead to data breaches, disruption of business operations, and damage to organizational reputation. Critical sectors relying on Alfresco for document management, such as government, finance, healthcare, and large enterprises, are particularly vulnerable. The absence of known exploits in the wild currently reduces immediate risk but does not diminish the urgency for mitigation.

Mitigation Recommendations

Organizations should monitor Hyland's official channels for patches addressing CVE-2026-26337 and apply them promptly upon release. Until patches are available, implement strict network segmentation to isolate Alfresco Transformation Service instances from sensitive internal resources. Employ web application firewalls (WAFs) with custom rules to detect and block path traversal patterns and suspicious SSRF attempts. Conduct thorough input validation and sanitization on any user-supplied data interacting with file paths. Limit the service's filesystem permissions to the minimum necessary, preventing access to sensitive directories. Enable detailed logging and monitoring to detect anomalous file access or outbound requests indicative of exploitation attempts. Regularly audit and review configuration files and access controls. Consider deploying intrusion detection systems (IDS) tuned for path traversal and SSRF signatures. Finally, educate security teams about this vulnerability to ensure rapid response capabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-02-13T17:28:43.053Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699747f4532dc41ff8925d5a

Added to database: 2/19/2026, 5:27:16 PM

Last enriched: 2/28/2026, 2:26:34 PM

Last updated: 4/4/2026, 12:01:38 PM

Views: 102

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses