Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2861: Information Disclosure in Foswiki

0
Medium
VulnerabilityCVE-2026-2861cvecve-2026-2861
Published: Sat Feb 21 2026 (02/21/2026, 06:02:07 UTC)
Source: CVE Database V5
Product: Foswiki

Description

A vulnerability was detected in Foswiki up to 2.1.10. The affected element is an unknown function of the component Changes/Viewfile/Oops. The manipulation results in information disclosure. It is possible to launch the attack remotely. The exploit is now public and may be used. Upgrading to version 2.1.11 is sufficient to fix this issue. The patch is identified as 31aeecb58b64/d8ed86b10e46. Upgrading the affected component is recommended.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/16/2026, 08:42:07 UTC

Technical Analysis

CVE-2026-2861 is a medium-severity information disclosure vulnerability affecting Foswiki, an open-source enterprise wiki platform, in all versions from 2.1.0 through 2.1.10. The vulnerability resides in an unspecified function within the Changes/Viewfile/Oops component, which can be manipulated remotely by an attacker to disclose sensitive information. The exact nature of the information disclosed is not detailed, but the flaw does not affect integrity or availability. The attack vector is network-based, requiring no authentication or user interaction, making it relatively easy to exploit. The vulnerability was publicly disclosed on February 21, 2026, and a public exploit is available, increasing the urgency for remediation. The Foswiki development team addressed the issue in version 2.1.11 by applying patches identified by commit hashes 31aeecb58b64 and d8ed86b10e46. No known exploits in the wild have been reported at the time of disclosure, but the presence of a public exploit means attackers can potentially leverage this vulnerability to gain unauthorized access to sensitive data stored or processed by Foswiki installations.

Potential Impact

The primary impact of CVE-2026-2861 is unauthorized information disclosure, which can compromise the confidentiality of sensitive organizational data managed within Foswiki environments. This may include internal documentation, project details, or other proprietary information, potentially leading to competitive disadvantage, reputational damage, or aiding further attacks such as social engineering or targeted intrusions. Since the vulnerability does not affect integrity or availability, it does not directly disrupt operations or data accuracy. However, the ease of remote exploitation without authentication increases the risk profile, especially for organizations exposing Foswiki instances to the internet. The availability of a public exploit further elevates the threat, potentially enabling widespread scanning and exploitation attempts. Organizations relying on Foswiki for collaboration and knowledge management should consider the risk of data leakage significant, particularly if sensitive or regulated information is stored within the platform.

Mitigation Recommendations

To mitigate CVE-2026-2861, organizations should promptly upgrade all Foswiki installations to version 2.1.11 or later, which contains the official patch for this vulnerability. Prior to upgrading, administrators should review and apply the patches identified by commit hashes 31aeecb58b64 and d8ed86b10e46 if immediate upgrade is not feasible. Additionally, organizations should restrict external access to Foswiki instances by implementing network-level controls such as firewalls or VPNs to limit exposure to trusted users only. Monitoring web server logs for unusual access patterns targeting the Changes/Viewfile/Oops component can help detect exploitation attempts. Employing web application firewalls (WAFs) with custom rules to block suspicious requests related to this component may provide temporary protection. Regularly auditing and minimizing sensitive data stored in Foswiki can reduce potential impact. Finally, organizations should maintain an incident response plan to address any suspected data breaches resulting from this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-20T14:07:22.958Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69994df7be58cf853b53146c

Added to database: 2/21/2026, 6:17:27 AM

Last enriched: 3/16/2026, 8:42:07 AM

Last updated: 4/7/2026, 5:50:38 AM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses