CVE-2026-26336
HIGHCVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Lifecycle Timeline
2DescriptionNVD
Hyland Alfresco allows unauthenticated attackers to read arbitrary files from protected directories (like WEB-INF) via the "/share/page/resource/" endpoint, thus leading to the disclosure of sensitive configuration files.
AnalysisAI
Unauthenticated attackers can bypass access controls in Alfresco Content Services to retrieve sensitive files from protected directories such as WEB-INF through the /share/page/resource/ endpoint. This vulnerability exposes critical configuration data and credentials without requiring authentication or user interaction. …
Sign in for full analysis, threat intelligence, and remediation guidance.
RemediationAI
Within 24 hours: Identify all Alfresco instances in your environment and validate exposure by testing the /share/page/resource/ endpoint from external networks. Within 7 days: Implement network-level access controls restricting external access to the Alfresco application or deploy WAF rules blocking requests to the vulnerable endpoint. …
Sign in for detailed remediation steps.
Share
External POC / Exploit Code
Leaving vuln.today