CVE-2026-26101
Published: 20 February 2026
Summary
CVE-2026-26101 is a high-severity Incorrect Permission Assignment for Critical Resource (CWE-732) vulnerability in Owlcyberdefense Opds-Talon. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique File System Permissions Weakness (T1044); ranked at the 4.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Employs least privilege to prevent low-privilege local attackers from manipulating critical resources via crafted network requests.
Enforces approved authorizations on critical resources, directly countering incorrect permission assignments that enable file manipulation.
Mandates secure configuration settings for critical resources, including proper file permissions, to mitigate improper assignments in Owl opds.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Incorrect permission assignment (CWE-732) on a critical resource directly enables abuse of file system permissions weakness (T1044) by a low-privileged local attacker; the resulting file manipulation with high C/I/A impact constitutes exploitation of a software vulnerability for privilege escalation (T1068).
NVD Description
Incorrect Permission Assignment for Critical Resource in Owl opds 2.2.0.4 allows File Manipulation via a crafted network request.
Deeper analysisAI
CVE-2026-26101, published on 2026-02-20, is an Incorrect Permission Assignment for Critical Resource vulnerability (CWE-732) in Owl opds version 2.2.0.4. This flaw enables file manipulation via a crafted network request due to improper permissions on a critical resource. The CVSS v3.1 base score is 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity with local access vector, low attack complexity, and low privileges required.
A local attacker with low privileges (PR:L) can exploit this vulnerability without user interaction by sending a crafted network request. Successful exploitation allows file manipulation on critical resources, resulting in high impacts to confidentiality, integrity, and availability (C:H/I:H/A:H).
Mitigation details are provided in the advisory at https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2026-26101.
Details
- CWE(s)