Cyber Posture

CVE-2026-26336

HighPublic PoC

Published: 19 February 2026

Published
19 February 2026
Modified
03 March 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0007 21.4th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-26336 is a high-severity Incorrect Authorization (CWE-863) vulnerability in Hyland Alfresco Content Services. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 21.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-863

Periodic review and update of procedures reduces incorrect authorization implementations over time.

addresses: CWE-863

Supervision identifies cases where authorization logic incorrectly permits unauthorized actions.

addresses: CWE-863

Defining permitted attribute values and auditing modifications reduces the chance of incorrect authorization outcomes due to tampered or missing labels.

addresses: CWE-863

The authorization process and usage restrictions help prevent incorrect authorization for remote access types.

addresses: CWE-863

Establishing configuration and connection requirements helps ensure correct rather than incorrect authorization for wireless access.

addresses: CWE-863

Establishing connection authorization processes for mobile devices helps ensure authorization decisions are correctly implemented rather than incorrect.

addresses: CWE-863

Monitoring account use, notifying on changes, and reviewing accounts for compliance corrects incorrect authorization assignments.

addresses: CWE-863

Ensures authorization decisions for external system use are correctly implemented and enforced.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
T1552.001 Credentials In Files Credential Access
Adversaries may search local file systems and remote file shares for files containing insecurely stored credentials.
Why these techniques?

Unauthenticated arbitrary file read on public-facing Alfresco web app directly maps to T1190 for initial access; enables remote collection of local system files (T1005) including config files that may contain credentials (T1552.001).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

Hyland Alfresco allows unauthenticated attackers to read arbitrary files from protected directories (like WEB-INF) via the "/share/page/resource/" endpoint, thus leading to the disclosure of sensitive configuration files.

Deeper analysisAI

CVE-2026-26336 is an unauthenticated arbitrary file read vulnerability in Hyland Alfresco. The flaw resides in the "/share/page/resource/" endpoint, which permits attackers to access files from protected directories such as WEB-INF, resulting in the disclosure of sensitive configuration files. Published on 2026-02-19, it carries a CVSS 3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) and maps to CWE-863 (Incorrect Authorization).

Unauthenticated attackers with network access can exploit this vulnerability due to its low attack complexity and lack of required privileges or user interaction. Exploitation allows remote reading of arbitrary files on the affected Alfresco instance, enabling the extraction of confidential configuration data that may reveal credentials, paths, or other system details to facilitate subsequent attacks.

Vendor and third-party advisories provide guidance on mitigation. Hyland's blog details the unauthenticated arbitrary file read issue at https://connect.hyland.com/t5/alfresco-blog/cve-2026-26336-unauthenticated-arbitrary-file-read-in-alfresco/ba-p/496550, while Vulncheck's advisory at https://www.vulncheck.com/advisories/hyland-alfresco-improper-authorization-arbitrary-file-read covers improper authorization aspects. Security teams should review these, along with the Alfresco Platform product page at https://www.hyland.com/en/solutions/products/alfresco-platform, for patch availability and remediation instructions.

Details

CWE(s)

Affected Products

hyland
alfresco content services
≤ 25.3 · 7.4.0 — 7.4.2.5 · 23.1 — 23.6.0

CVEs Like This One

CVE-2026-26337Same vendor: Hyland
CVE-2026-26338Same vendor: Hyland
CVE-2026-26339Same vendor: Hyland
CVE-2026-28229Shared CWE-863
CVE-2026-42438Shared CWE-863
CVE-2026-40515Shared CWE-863
CVE-2026-22682Shared CWE-863
CVE-2026-24748Shared CWE-863
CVE-2026-34376Shared CWE-863
CVE-2026-23989Shared CWE-863

References