Description
Hyland Alfresco Transformation Service allows unauthenticated attackers to achieve both arbitrary file read and server-side request forgery through the absolute path traversal.
Published: 2026-02-19
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary File Read and SSRF
Action: Immediate Patch
AI Analysis

Impact

The vulnerability in the Hyland Alfresco Transformation Service allows an attacker without authentication to read any file on the hosting system via an absolute path traversal in the service’s request handling, and to craft requests that reach internal or external servers through Server‑Side Request Forgery. This is a classic path‑traversal weakness numbered CWE‑36, and it can lead to disclosure of sensitive configuration or credential files as well as enabling further lateral movement or exfiltration through forged requests.

Affected Systems

Hyland Alfresco Community (Transform Core) and Hyland Alfresco Transformation Service (Enterprise) are impacted. No specific patch level is mentioned in the advisory, so all deployed instances of these products remain vulnerable until an official release addresses the issue.

Risk and Exploitability

The CVSS score of 8.8 classifies the flaw as high severity. The EPSS score of less than 1% indicates that real‑world exploitation is unlikely but not impossible, and the vulnerability is not currently listed in the CISA KEV catalog. Attackers can likely exploit the flaw by sending crafted HTTP requests to the transformation endpoint, and because no authentication is required, the attack surface is broad. The risk to an organization depends on network exposure of the service; an internal or externally reachable instance increases the threat.

Generated by OpenCVE AI on April 17, 2026 at 18:02 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor‑issued patch or update to a fixed release of the Transform Core or Transformation Service
  • If a patch is not yet available, restrict network access to the service or place it behind a firewall so that only trusted hosts can reach it
  • Disable the affected transformation endpoint or enforce strict input validation rules to prevent unintended file access and remove any ability to specify absolute paths

Generated by OpenCVE AI on April 17, 2026 at 18:02 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 02 Mar 2026 22:15:00 +0000

Type Values Removed Values Added
First Time appeared Hyland alfresco Transform Core
Hyland alfresco Transform Service
CPEs cpe:2.3:a:hyland:alfresco_transform_core:*:*:*:*:*:*:*:*
cpe:2.3:a:hyland:alfresco_transform_core:5.3.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:hyland:alfresco_transform_service:*:*:*:*:*:*:*:*
Vendors & Products Hyland alfresco Transform Core
Hyland alfresco Transform Service

Fri, 20 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Feb 2026 15:15:00 +0000


Fri, 20 Feb 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Hyland
Hyland alfresco Community
Hyland alfresco Transformation Service
Vendors & Products Hyland
Hyland alfresco Community
Hyland alfresco Transformation Service

Thu, 19 Feb 2026 17:30:00 +0000

Type Values Removed Values Added
Description Hyland Alfresco Transformation Service allows unauthenticated attackers to achieve both arbitrary file read and server-side request forgery through the absolute path traversal.
Title Hyland Alfresco Transformation Service Absolute Path Traversal Arbitrary File Read and SSRF
Weaknesses CWE-36
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}

cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Hyland Alfresco Community Alfresco Transform Core Alfresco Transform Service Alfresco Transformation Service
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-02-20T19:08:14.840Z

Reserved: 2026-02-13T17:28:43.053Z

Link: CVE-2026-26337

cve-icon Vulnrichment

Updated: 2026-02-20T19:08:03.544Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-19T18:24:59.730

Modified: 2026-03-02T22:03:57.953

Link: CVE-2026-26337

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T18:15:26Z

Weaknesses