Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2861: Information Disclosure in Foswiki

0
Medium
VulnerabilityCVE-2026-2861cvecve-2026-2861
Published: Sat Feb 21 2026 (02/21/2026, 06:02:07 UTC)
Source: CVE Database V5
Product: Foswiki

Description

CVE-2026-2861 is an information disclosure vulnerability affecting Foswiki versions up to 2. 1. 10. The flaw exists in an unspecified function within the Changes/Viewfile/Oops component, allowing remote attackers to obtain sensitive information without authentication or user interaction. The vulnerability has a CVSS 4. 0 base score of 6. 9, indicating medium severity. Exploitation requires no privileges and no user interaction, making it relatively easy to exploit remotely. Although no known exploits are currently observed in the wild, a public exploit is available. Upgrading to Foswiki version 2.

AI-Powered Analysis

AILast updated: 02/21/2026, 06:31:38 UTC

Technical Analysis

CVE-2026-2861 is a medium-severity information disclosure vulnerability found in Foswiki, an open-source enterprise collaboration platform. The vulnerability affects all versions from 2.1.0 through 2.1.10 and resides in an unspecified function within the Changes/Viewfile/Oops component. This flaw allows remote attackers to manipulate the component to disclose sensitive information without requiring authentication or user interaction. The vulnerability is exploitable over the network with low attack complexity and no privileges needed, increasing the risk of unauthorized data exposure. The disclosed information could potentially include internal configuration details, user data, or other sensitive content stored or processed by Foswiki. A public exploit has been released, increasing the urgency for affected users to upgrade. The issue is resolved in Foswiki version 2.1.11, which includes a patch identified by commit hashes 31aeecb58b64 and d8ed86b10e46. No known active exploitation in the wild has been reported yet, but the availability of a public exploit raises the risk of imminent attacks. The vulnerability does not affect confidentiality, integrity, or availability beyond information disclosure, but the leaked data could facilitate further attacks or reconnaissance.

Potential Impact

The primary impact of CVE-2026-2861 is unauthorized disclosure of sensitive information from Foswiki installations. This can lead to exposure of internal documentation, user credentials, or configuration data, which attackers could leverage for further exploitation, including privilege escalation or lateral movement within an organization. Since Foswiki is often used for internal collaboration and knowledge management, the leak of such information could compromise organizational confidentiality and competitive advantage. The ease of remote exploitation without authentication increases the risk of widespread attacks, especially in environments where Foswiki is exposed to the internet. Although no direct integrity or availability impact is reported, the information disclosure could facilitate subsequent attacks that might affect these security properties. Organizations relying on Foswiki for critical documentation or sensitive data storage are at particular risk, as attackers could gain insights into internal processes or vulnerabilities. The medium severity rating reflects the balance between the limited scope of impact (information disclosure only) and the ease of exploitation.

Mitigation Recommendations

To mitigate CVE-2026-2861, organizations should immediately upgrade all Foswiki instances to version 2.1.11 or later, which contains the official patch for this vulnerability. If immediate upgrading is not feasible, administrators should restrict network access to Foswiki servers, limiting exposure to trusted internal networks only. Implementing web application firewalls (WAFs) with rules to detect and block suspicious requests targeting the Changes/Viewfile/Oops component can provide temporary protection. Regularly audit Foswiki logs for unusual access patterns or attempts to exploit this vulnerability. Additionally, review and minimize the amount of sensitive information stored in Foswiki to reduce potential exposure. Organizations should also ensure that Foswiki instances are not directly accessible from the public internet unless necessary and are protected by strong network segmentation and access controls. Monitoring threat intelligence feeds for any emerging exploits or attack campaigns targeting this vulnerability is recommended to respond promptly to active threats.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-20T14:07:22.958Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69994df7be58cf853b53146c

Added to database: 2/21/2026, 6:17:27 AM

Last enriched: 2/21/2026, 6:31:38 AM

Last updated: 2/21/2026, 7:26:37 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats