Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
5.3
CoCoTeaNet CyreneAdmin Image Handler Path Traversal Risk
CVE-2026-2692
Summary
An attacker can access unauthorized files on your server by manipulating a specific request to the CyreneAdmin image handler. This could potentially allow unauthorized access to sensitive information. Update to the latest version of CyreneAdmin to fix the issue.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| cocoteanet | cyreneadmin | <= 1.3.0 | – |
Original title
A vulnerability was found in CoCoTeaNet CyreneAdmin up to 1.3.0. This affects an unknown part of the file /api/system/user/getAvatar of the component Image Handler. Performing a manipulation of the...
Original description
A vulnerability was found in CoCoTeaNet CyreneAdmin up to 1.3.0. This affects an unknown part of the file /api/system/user/getAvatar of the component Image Handler. Performing a manipulation of the argument Avatar results in path traversal. The attack can be initiated remotely. The exploit has been made public and could be used.
nvd CVSS2.0
4.0
nvd CVSS3.1
6.5
nvd CVSS4.0
5.3
Vulnerability type
CWE-22
Path Traversal
- https://vuldb.com/?ctiid.346492 Permissions Required VDB Entry
- https://vuldb.com/?id.346492 Third Party Advisory VDB Entry
- https://vuldb.com/?submit.754241 Exploit Third Party Advisory VDB Entry
Published: 19 Feb 2026 · Updated: 11 Mar 2026 · First seen: 6 Mar 2026