CVE-2026-2692

Source
https://cve.org/CVERecord?id=CVE-2026-2692
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-2692.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-2692
Published
2026-02-19T07:17:48.470Z
Modified
2026-02-23T08:40:03.000257Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

A vulnerability was found in CoCoTeaNet CyreneAdmin up to 1.3.0. This affects an unknown part of the file /api/system/user/getAvatar of the component Image Handler. Performing a manipulation of the argument Avatar results in path traversal. The attack can be initiated remotely. The exploit has been made public and could be used.

References

Affected packages

Git / github.com/cocoteanet/cyreneadmin

Affected ranges

Type
GIT
Repo
https://github.com/cocoteanet/cyreneadmin
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

1.*
1.0.0
v1.*
v1.1.0
v1.2.0
v1.3.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-2692.json"