Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
8.4
Owl opds 2.2.0.4 allows manipulation of configuration files via network request
CVE-2026-26097
Summary
An attacker can send a specific network request to the Owl opds server, potentially allowing them to modify the configuration files. This could lead to unauthorized changes to the system's behavior. You should update to the latest version of Owl opds to fix this issue.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| owlcyberdefense | opds-talon | 2.2.0.4 | – |
| owlcyberdefense | opds-talon | 2.2.0.4 | – |
Original title
Uncontrolled Search Path Element in Owl opds 2.2.0.4 allows Leveraging/Manipulating Configuration File Search Paths via a crafted network request.
Original description
Uncontrolled Search Path Element in Owl opds 2.2.0.4 allows Leveraging/Manipulating Configuration File Search Paths via a crafted network request.
nvd CVSS3.1
5.5
nvd CVSS4.0
8.4
Vulnerability type
CWE-427
Uncontrolled Search Path Element
- https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2026-26097 Third Party Advisory
Published: 20 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026