Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2894: Information Disclosure in funadmin

0
Medium
VulnerabilityCVE-2026-2894cvecve-2026-2894
Published: Sat Feb 21 2026 (02/21/2026, 23:02:09 UTC)
Source: CVE Database V5
Product: funadmin

Description

CVE-2026-2894 is an information disclosure vulnerability in funadmin versions up to 7. 1. 0-rc4, specifically in the getMember function within app/frontend/view/login/forget. html. This flaw allows remote attackers to obtain sensitive information without authentication or user interaction. The vulnerability has a CVSS 4. 0 base score of 6. 9, indicating medium severity. Exploits are publicly available, though no confirmed active exploitation has been reported. The vendor has not responded to disclosure attempts, and no official patches exist yet.

AI-Powered Analysis

AILast updated: 02/21/2026, 23:31:35 UTC

Technical Analysis

CVE-2026-2894 is a medium-severity information disclosure vulnerability affecting funadmin versions 7.1.0-rc1 through 7.1.0-rc4. The flaw resides in the getMember function located in the file app/frontend/view/login/forget.html. This function can be manipulated remotely without any authentication or user interaction, allowing attackers to retrieve sensitive information from the system. The vulnerability is exploitable over the network with low attack complexity and no privileges required, increasing its risk profile. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P) indicates partial impact on confidentiality with no effect on integrity or availability. Although no known exploits in the wild have been confirmed, publicly available exploit code exists, raising the likelihood of exploitation. The vendor was notified early but has not issued any response or patch, leaving systems exposed. The vulnerability could be leveraged to gather information that facilitates further attacks such as credential harvesting, privilege escalation, or targeted phishing. The lack of vendor remediation increases the urgency for organizations to implement compensating controls. Funadmin is a web-based administration framework, and this vulnerability affects its login-related functionality, which is a common attack vector. The absence of authentication requirements and user interaction makes this vulnerability particularly accessible to remote attackers.

Potential Impact

The primary impact of CVE-2026-2894 is unauthorized disclosure of sensitive information, which can compromise confidentiality. This exposure can enable attackers to gather data useful for subsequent attacks, including identity theft, unauthorized access, or lateral movement within networks. Organizations relying on funadmin for administrative or user management functions may face increased risk of data breaches. Although the vulnerability does not directly affect system integrity or availability, the leaked information could facilitate more damaging exploits. The medium CVSS score reflects a moderate risk, but the availability of public exploits and lack of vendor response elevate the threat. For organizations with internet-facing funadmin instances, the risk of remote exploitation is significant. This can lead to reputational damage, regulatory penalties, and operational disruptions if sensitive user or system data is exposed. The absence of patches means organizations must rely on mitigation strategies until official fixes are released.

Mitigation Recommendations

1. Immediately restrict external access to the affected getMember function and the forget.html endpoint by implementing network-level controls such as firewalls or web application firewalls (WAFs) with custom rules to block suspicious requests. 2. Monitor web server logs and application logs for unusual access patterns targeting the forget.html page or getMember function to detect potential exploitation attempts. 3. Employ rate limiting and IP reputation filtering to reduce the risk of automated attacks exploiting this vulnerability. 4. If possible, disable or temporarily remove the forget password functionality until a patch or official fix is available. 5. Regularly check for vendor updates or community patches addressing this vulnerability and apply them promptly once released. 6. Conduct internal audits to identify and secure any sensitive information that could be exposed through this vulnerability. 7. Educate system administrators and security teams about this vulnerability and ensure incident response plans include steps for potential exploitation scenarios. 8. Consider deploying application-layer encryption or tokenization for sensitive data to minimize the impact of information disclosure. 9. Use intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting funadmin components. 10. Engage with the funadmin community or security forums to share information and obtain any unofficial mitigations or workarounds.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-20T18:56:39.810Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699a3cfabe58cf853b5c2203

Added to database: 2/21/2026, 11:17:14 PM

Last enriched: 2/21/2026, 11:31:35 PM

Last updated: 2/22/2026, 6:21:34 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats