CVE-2026-26002
Published: 04 March 2026
Summary
CVE-2026-26002 is a critical-severity Injection (CWE-74) vulnerability in Osc Open Ondemand. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 18.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mandates timely patching of known vulnerabilities like CVE-2026-26002 in Open OnDemand Files application to prevent exploitation.
Requires validation of untrusted inputs such as directory navigation paths to neutralize malicious input leading to injection-based compromise.
Enables vulnerability scanning to identify and prioritize remediation of flaws like CVE-2026-26002 in deployed Open OnDemand versions.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated remote injection flaw (CWE-74) in public-facing Open OnDemand Files web app directly enables exploitation of a public-facing application for full system compromise.
NVD Description
Open OnDemand is an open-source high-performance computing portal. The Files application in OnDemand versions prior to 4.0.9 and 4.1.3 is susceptible to malicious input when navigating to a directory. This has been patched in versions 4.0.9 and 4.1.3. Versions below…
more
this remain susceptible.
Deeper analysisAI
CVE-2026-26002 is a vulnerability in the Files application of Open OnDemand, an open-source high-performance computing portal. Versions prior to 4.0.9 and 4.1.3 are susceptible to malicious input when navigating to a directory, as classified under CWE-74. The issue carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
An unauthenticated remote attacker can exploit this vulnerability over the network with low attack complexity and no user interaction required. Successful exploitation enables high-impact compromise of confidentiality, integrity, and availability.
The vulnerability has been addressed in Open OnDemand versions 4.0.9 and 4.1.3. Affected versions remain susceptible, and administrators are advised to upgrade promptly. Additional details are available in the GitHub security advisory at GHSA-f83q-mhrr-3cr2 and the associated patching commits.
Details
- CWE(s)