Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2731: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in DynamicWeb DynamicWeb 9

0
Critical
VulnerabilityCVE-2026-2731cvecve-2026-2731cwe-22
Published: Thu Feb 19 2026 (02/19/2026, 06:46:52 UTC)
Source: CVE Database V5
Vendor/Project: DynamicWeb
Product: DynamicWeb 9

Description

Path traversal and content injection in JobRunnerBackground.aspx in DynamicWeb 8 (all) and 9 (<9.19.7 and <9.20.3) allows unauthenticated attackers to execute code via simple web requests

AI-Powered Analysis

AILast updated: 02/19/2026, 07:25:35 UTC

Technical Analysis

CVE-2026-2731 is a critical security vulnerability classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory, commonly known as path traversal) affecting DynamicWeb versions 8 and 9 prior to 9.19.7 and 9.20.3. The vulnerability resides in the JobRunnerBackground.aspx page, which improperly validates user-supplied input used in file path operations. This flaw allows unauthenticated attackers to craft simple HTTP requests that traverse directories outside the intended scope, enabling them to inject malicious content or execute arbitrary code on the server. The vulnerability does not require authentication or user interaction, making it trivially exploitable remotely over the network. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H) reflects a perfect score of 10.0, indicating that the attack is network-based, requires no privileges or user interaction, and results in complete compromise of confidentiality, integrity, and availability. The flaw affects all versions of DynamicWeb 8 and 9 up to 9.19.7 and 9.20.3, including 9.20.0. Although no public exploits have been reported yet, the nature of the vulnerability suggests that exploitation could lead to full system takeover, data theft, defacement, or service disruption. DynamicWeb is a content management system widely used by European organizations for e-commerce, government portals, and publishing platforms, making this vulnerability particularly impactful. The lack of available patches at the time of disclosure necessitates immediate mitigation efforts to reduce risk exposure.

Potential Impact

The impact of CVE-2026-2731 on European organizations is severe due to the critical nature of the vulnerability and the widespread use of DynamicWeb CMS in various sectors. Successful exploitation can lead to remote code execution, allowing attackers to gain full control over affected web servers. This can result in unauthorized data access or theft, website defacement, disruption of services, and potential lateral movement within corporate networks. Confidential information, including customer data and internal documents, could be exposed or manipulated, undermining trust and compliance with data protection regulations such as GDPR. The availability of affected systems could be compromised, causing operational downtime and financial losses. Given the vulnerability requires no authentication or user interaction, attackers can rapidly exploit vulnerable systems at scale. European organizations in government, retail, and media sectors using DynamicWeb are particularly at risk, potentially facing reputational damage and regulatory penalties if breaches occur.

Mitigation Recommendations

1. Immediate application of official patches or updates from DynamicWeb once released, specifically versions 9.19.7, 9.20.3, or later. 2. Until patches are available, restrict external access to the JobRunnerBackground.aspx endpoint using network-level controls such as IP whitelisting or VPN access. 3. Deploy and configure Web Application Firewalls (WAFs) with rules to detect and block path traversal attempts and suspicious payloads targeting DynamicWeb components. 4. Conduct thorough code reviews and configuration audits to ensure no other endpoints are vulnerable to similar path traversal or injection flaws. 5. Implement strict input validation and sanitization on all user-supplied data, especially parameters used in file path operations. 6. Monitor web server logs and intrusion detection systems for anomalous requests indicative of exploitation attempts. 7. Educate IT and security teams about this vulnerability to ensure rapid detection and response. 8. Consider isolating DynamicWeb servers in segmented network zones to limit potential lateral movement in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
NCSC-FI
Date Reserved
2026-02-19T05:59:41.416Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6996b7926aea4a407a43b2c5

Added to database: 2/19/2026, 7:11:14 AM

Last enriched: 2/19/2026, 7:25:35 AM

Last updated: 2/19/2026, 11:28:05 AM

Views: 26

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats