Description
Hyland Alfresco Transformation Service allows unauthenticated attackers to achieve remote code execution through the argument injection vulnerability, which exists in the document processing functionality.
Published: 2026-02-19
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

Hyland Alfresco Transformation Service permits unauthenticated attackers to inject arguments into the document processing function, leading to remote code execution. The vulnerability is classified as argument injection (CWE‑918) and carries a CVSS score of 9.3, indicating a severe risk when exploited.

Affected Systems

The affected products are Hyland's Alfresco Community (Transform Core) and Hyland's Alfresco Transformation Service (Enterprise). No specific version information was supplied, so all deployments of these products may be vulnerable.

Risk and Exploitability

The likelihood of exploitation presently appears low, with an EPSS score of less than 1%. However, the vulnerability is not listed in CISA's Known Exploited Vulnerabilities catalog, implying no active exploitation reported at this time. Attackers would likely exploit the service by sending crafted documents or parameters that trigger the injection, granting them the ability to run arbitrary commands without authentication.

Generated by OpenCVE AI on April 17, 2026 at 18:02 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest security update or patch released by Hyland that addresses the argument injection in the transformation service.
  • If no patch is immediately available, limit access to the transformation service so that only trusted hosts or internal users can submit document processing requests.
  • As a temporary workaround, enforce authentication for all requests to the document processing endpoint or disable the transformation feature until a patch is applied.

Generated by OpenCVE AI on April 17, 2026 at 18:02 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 02 Mar 2026 22:15:00 +0000

Type Values Removed Values Added
First Time appeared Hyland alfresco Transform Core
Hyland alfresco Transform Service
CPEs cpe:2.3:a:hyland:alfresco_transformation_service:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:hyland:transform_core_aio:*:*:*:*:community:*:*:*
cpe:2.3:a:hyland:alfresco_transform_core:*:*:*:*:*:*:*:*
cpe:2.3:a:hyland:alfresco_transform_service:*:*:*:*:*:*:*:*
Vendors & Products Hyland transform Core Aio
Hyland alfresco Transform Core
Hyland alfresco Transform Service

Sat, 28 Feb 2026 00:15:00 +0000

Type Values Removed Values Added
First Time appeared Hyland transform Core Aio
CPEs cpe:2.3:a:hyland:alfresco_transformation_service:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:hyland:transform_core_aio:*:*:*:*:community:*:*:*
Vendors & Products Hyland transform Core Aio

Fri, 20 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 20 Feb 2026 15:15:00 +0000


Fri, 20 Feb 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Hyland
Hyland alfresco Community
Hyland alfresco Transformation Service
Vendors & Products Hyland
Hyland alfresco Community
Hyland alfresco Transformation Service

Thu, 19 Feb 2026 17:30:00 +0000

Type Values Removed Values Added
Description Hyland Alfresco Transformation Service allows unauthenticated attackers to achieve remote code execution through the argument injection vulnerability, which exists in the document processing functionality.
Title Hyland Alfresco Transformation Service Argument Injection RCE
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Hyland Alfresco Community Alfresco Transform Core Alfresco Transform Service Alfresco Transformation Service
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-02-20T20:31:03.964Z

Reserved: 2026-02-13T17:28:43.053Z

Link: CVE-2026-26339

cve-icon Vulnrichment

Updated: 2026-02-20T20:30:58.120Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-19T18:25:00.133

Modified: 2026-03-02T22:07:07.077

Link: CVE-2026-26339

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T18:15:26Z

Weaknesses