Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2692: Path Traversal in CoCoTeaNet CyreneAdmin

0
Medium
VulnerabilityCVE-2026-2692cvecve-2026-2692
Published: Thu Feb 19 2026 (02/19/2026, 02:02:06 UTC)
Source: CVE Database V5
Vendor/Project: CoCoTeaNet
Product: CyreneAdmin

Description

CVE-2026-2692 is a medium severity path traversal vulnerability in CoCoTeaNet CyreneAdmin versions up to 1. 3. 0. It affects the /api/system/user/getAvatar endpoint within the Image Handler component, where manipulation of the Avatar argument allows an attacker to traverse directories and potentially access unauthorized files. The vulnerability can be exploited remotely without authentication or user interaction. Although no public exploits are currently observed in the wild, the exploit code has been made public. The CVSS 4. 0 score is 5. 3, reflecting moderate impact primarily on confidentiality. European organizations using CyreneAdmin should prioritize patching or mitigating this vulnerability to prevent unauthorized data exposure.

AI-Powered Analysis

AILast updated: 02/19/2026, 02:40:46 UTC

Technical Analysis

CVE-2026-2692 is a path traversal vulnerability identified in CoCoTeaNet's CyreneAdmin product, affecting versions 1.0 through 1.3.0. The flaw resides in the /api/system/user/getAvatar API endpoint, specifically within the Image Handler component. By manipulating the 'Avatar' parameter, an attacker can perform directory traversal attacks, enabling access to files outside the intended directory scope. This vulnerability does not require authentication or user interaction, making it remotely exploitable over the network. The vulnerability's CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P) indicates network attack vector, low attack complexity, no authentication required, and partial confidentiality impact. While no active exploitation in the wild has been reported, the public availability of exploit code increases the risk of future attacks. The vulnerability could lead to unauthorized disclosure of sensitive files, potentially exposing user data or system configuration details. The lack of integrity or availability impact suggests the attack is primarily information disclosure. The vulnerability is categorized as medium severity due to its moderate impact and ease of exploitation. No official patches are currently linked, so organizations must implement interim mitigations.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized access to sensitive files on systems running vulnerable versions of CyreneAdmin. This could lead to exposure of user data, configuration files, or other sensitive information, potentially facilitating further attacks or data breaches. Organizations in sectors such as government, finance, healthcare, and critical infrastructure that rely on CyreneAdmin for administrative or user management functions are particularly at risk. The remote exploitability without authentication increases the threat surface, especially for internet-facing deployments. Although the impact on confidentiality is partial, the exposure of sensitive files could have regulatory and reputational consequences under GDPR and other data protection laws. The absence of known active exploitation reduces immediate risk but does not eliminate the threat, especially given the public exploit availability. European entities with limited patch management capabilities or legacy systems may face higher exposure.

Mitigation Recommendations

Since no official patches are currently available, organizations should implement strict input validation on the 'Avatar' parameter to prevent directory traversal sequences such as '../'. Employing allowlists for acceptable file names or extensions can reduce risk. Restrict the file system permissions of the CyreneAdmin application to limit access to only necessary directories, preventing unauthorized file reads. Deploy web application firewalls (WAFs) with rules to detect and block path traversal patterns targeting the /api/system/user/getAvatar endpoint. Monitor logs and API access patterns for unusual requests that attempt directory traversal. Isolate CyreneAdmin instances from public networks or restrict access via VPN or IP whitelisting. Plan for timely patching once official updates are released by CoCoTeaNet. Conduct security audits and penetration testing focusing on API endpoints to identify similar vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-18T14:20:35.082Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699674c56aea4a407a102a08

Added to database: 2/19/2026, 2:26:13 AM

Last enriched: 2/19/2026, 2:40:46 AM

Last updated: 2/19/2026, 4:54:28 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats