Cyber Posture

CVE-2026-26002

Critical

Published: 04 March 2026

Published
04 March 2026
Modified
18 March 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0006 18.5th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-26002 is a critical-severity Injection (CWE-74) vulnerability in Osc Open Ondemand. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 18.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

preventrecover

Directly mandates timely patching of known vulnerabilities like CVE-2026-26002 in Open OnDemand Files application to prevent exploitation.

prevent

Requires validation of untrusted inputs such as directory navigation paths to neutralize malicious input leading to injection-based compromise.

detect

Enables vulnerability scanning to identify and prioritize remediation of flaws like CVE-2026-26002 in deployed Open OnDemand versions.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Unauthenticated remote injection flaw (CWE-74) in public-facing Open OnDemand Files web app directly enables exploitation of a public-facing application for full system compromise.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Open OnDemand is an open-source high-performance computing portal. The Files application in OnDemand versions prior to 4.0.9 and 4.1.3 is susceptible to malicious input when navigating to a directory. This has been patched in versions 4.0.9 and 4.1.3. Versions below…

more

this remain susceptible.

Deeper analysisAI

CVE-2026-26002 is a vulnerability in the Files application of Open OnDemand, an open-source high-performance computing portal. Versions prior to 4.0.9 and 4.1.3 are susceptible to malicious input when navigating to a directory, as classified under CWE-74. The issue carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

An unauthenticated remote attacker can exploit this vulnerability over the network with low attack complexity and no user interaction required. Successful exploitation enables high-impact compromise of confidentiality, integrity, and availability.

The vulnerability has been addressed in Open OnDemand versions 4.0.9 and 4.1.3. Affected versions remain susceptible, and administrators are advised to upgrade promptly. Additional details are available in the GitHub security advisory at GHSA-f83q-mhrr-3cr2 and the associated patching commits.

Details

CWE(s)

Affected Products

osc
open ondemand
≤ 3.1.16 · 4.0.0 — 4.0.9 · 4.1.0 — 4.1.3

CVEs Like This One

CVE-2026-27194Shared CWE-74
CVE-2026-31816Shared CWE-74
CVE-2026-25814Shared CWE-74
CVE-2026-32695Shared CWE-74
CVE-2025-64428Shared CWE-74
CVE-2025-20337Shared CWE-74
CVE-2026-27727Shared CWE-74
CVE-2026-2019Shared CWE-74
CVE-2026-33202Shared CWE-74
CVE-2026-7228Shared CWE-74

References