CVE-2026-2861: Information Disclosure in Foswiki
CVE-2026-2861 is an information disclosure vulnerability affecting Foswiki versions up to 2. 1. 10. The flaw exists in an unspecified function within the Changes/Viewfile/Oops component, allowing remote attackers to obtain sensitive information without authentication or user interaction. The vulnerability has a CVSS 4. 0 base score of 6. 9, indicating medium severity. Exploitation requires no privileges and no user interaction, making it relatively easy to exploit remotely. Although no known exploits are currently observed in the wild, a public exploit is available. Upgrading to Foswiki version 2.
AI Analysis
Technical Summary
CVE-2026-2861 is a medium-severity information disclosure vulnerability found in Foswiki, an open-source enterprise collaboration platform. The vulnerability affects all versions from 2.1.0 through 2.1.10 and resides in an unspecified function within the Changes/Viewfile/Oops component. This flaw allows remote attackers to manipulate the component to disclose sensitive information without requiring authentication or user interaction. The vulnerability is exploitable over the network with low attack complexity and no privileges needed, increasing the risk of unauthorized data exposure. The disclosed information could potentially include internal configuration details, user data, or other sensitive content stored or processed by Foswiki. A public exploit has been released, increasing the urgency for affected users to upgrade. The issue is resolved in Foswiki version 2.1.11, which includes a patch identified by commit hashes 31aeecb58b64 and d8ed86b10e46. No known active exploitation in the wild has been reported yet, but the availability of a public exploit raises the risk of imminent attacks. The vulnerability does not affect confidentiality, integrity, or availability beyond information disclosure, but the leaked data could facilitate further attacks or reconnaissance.
Potential Impact
The primary impact of CVE-2026-2861 is unauthorized disclosure of sensitive information from Foswiki installations. This can lead to exposure of internal documentation, user credentials, or configuration data, which attackers could leverage for further exploitation, including privilege escalation or lateral movement within an organization. Since Foswiki is often used for internal collaboration and knowledge management, the leak of such information could compromise organizational confidentiality and competitive advantage. The ease of remote exploitation without authentication increases the risk of widespread attacks, especially in environments where Foswiki is exposed to the internet. Although no direct integrity or availability impact is reported, the information disclosure could facilitate subsequent attacks that might affect these security properties. Organizations relying on Foswiki for critical documentation or sensitive data storage are at particular risk, as attackers could gain insights into internal processes or vulnerabilities. The medium severity rating reflects the balance between the limited scope of impact (information disclosure only) and the ease of exploitation.
Mitigation Recommendations
To mitigate CVE-2026-2861, organizations should immediately upgrade all Foswiki instances to version 2.1.11 or later, which contains the official patch for this vulnerability. If immediate upgrading is not feasible, administrators should restrict network access to Foswiki servers, limiting exposure to trusted internal networks only. Implementing web application firewalls (WAFs) with rules to detect and block suspicious requests targeting the Changes/Viewfile/Oops component can provide temporary protection. Regularly audit Foswiki logs for unusual access patterns or attempts to exploit this vulnerability. Additionally, review and minimize the amount of sensitive information stored in Foswiki to reduce potential exposure. Organizations should also ensure that Foswiki instances are not directly accessible from the public internet unless necessary and are protected by strong network segmentation and access controls. Monitoring threat intelligence feeds for any emerging exploits or attack campaigns targeting this vulnerability is recommended to respond promptly to active threats.
Affected Countries
United States, Germany, United Kingdom, France, Japan, Canada, Australia, Netherlands, India, Brazil
CVE-2026-2861: Information Disclosure in Foswiki
Description
CVE-2026-2861 is an information disclosure vulnerability affecting Foswiki versions up to 2. 1. 10. The flaw exists in an unspecified function within the Changes/Viewfile/Oops component, allowing remote attackers to obtain sensitive information without authentication or user interaction. The vulnerability has a CVSS 4. 0 base score of 6. 9, indicating medium severity. Exploitation requires no privileges and no user interaction, making it relatively easy to exploit remotely. Although no known exploits are currently observed in the wild, a public exploit is available. Upgrading to Foswiki version 2.
AI-Powered Analysis
Technical Analysis
CVE-2026-2861 is a medium-severity information disclosure vulnerability found in Foswiki, an open-source enterprise collaboration platform. The vulnerability affects all versions from 2.1.0 through 2.1.10 and resides in an unspecified function within the Changes/Viewfile/Oops component. This flaw allows remote attackers to manipulate the component to disclose sensitive information without requiring authentication or user interaction. The vulnerability is exploitable over the network with low attack complexity and no privileges needed, increasing the risk of unauthorized data exposure. The disclosed information could potentially include internal configuration details, user data, or other sensitive content stored or processed by Foswiki. A public exploit has been released, increasing the urgency for affected users to upgrade. The issue is resolved in Foswiki version 2.1.11, which includes a patch identified by commit hashes 31aeecb58b64 and d8ed86b10e46. No known active exploitation in the wild has been reported yet, but the availability of a public exploit raises the risk of imminent attacks. The vulnerability does not affect confidentiality, integrity, or availability beyond information disclosure, but the leaked data could facilitate further attacks or reconnaissance.
Potential Impact
The primary impact of CVE-2026-2861 is unauthorized disclosure of sensitive information from Foswiki installations. This can lead to exposure of internal documentation, user credentials, or configuration data, which attackers could leverage for further exploitation, including privilege escalation or lateral movement within an organization. Since Foswiki is often used for internal collaboration and knowledge management, the leak of such information could compromise organizational confidentiality and competitive advantage. The ease of remote exploitation without authentication increases the risk of widespread attacks, especially in environments where Foswiki is exposed to the internet. Although no direct integrity or availability impact is reported, the information disclosure could facilitate subsequent attacks that might affect these security properties. Organizations relying on Foswiki for critical documentation or sensitive data storage are at particular risk, as attackers could gain insights into internal processes or vulnerabilities. The medium severity rating reflects the balance between the limited scope of impact (information disclosure only) and the ease of exploitation.
Mitigation Recommendations
To mitigate CVE-2026-2861, organizations should immediately upgrade all Foswiki instances to version 2.1.11 or later, which contains the official patch for this vulnerability. If immediate upgrading is not feasible, administrators should restrict network access to Foswiki servers, limiting exposure to trusted internal networks only. Implementing web application firewalls (WAFs) with rules to detect and block suspicious requests targeting the Changes/Viewfile/Oops component can provide temporary protection. Regularly audit Foswiki logs for unusual access patterns or attempts to exploit this vulnerability. Additionally, review and minimize the amount of sensitive information stored in Foswiki to reduce potential exposure. Organizations should also ensure that Foswiki instances are not directly accessible from the public internet unless necessary and are protected by strong network segmentation and access controls. Monitoring threat intelligence feeds for any emerging exploits or attack campaigns targeting this vulnerability is recommended to respond promptly to active threats.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-20T14:07:22.958Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69994df7be58cf853b53146c
Added to database: 2/21/2026, 6:17:27 AM
Last enriched: 2/21/2026, 6:31:38 AM
Last updated: 2/21/2026, 7:26:37 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27458: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in Kovah LinkAce
HighCVE-2026-27452: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in JonathanWilbur asn1-ts
CriticalCVE-2026-27206: CWE-502: Deserialization of Untrusted Data in zumba json-serializer
HighCVE-2026-27471: CWE-862: Missing Authorization in frappe erpnext
CriticalCVE-2026-2863: Path Traversal in feng_ha_ha ssm-erp
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.