CVE-2026-2861
📋 TL;DR
This vulnerability in Foswiki allows remote attackers to access sensitive information through the Changes/Viewfile/Oops component. It affects all Foswiki installations up to version 2.1.10. The information disclosure could expose internal data that should not be publicly accessible.
💻 Affected Systems
- Foswiki
📦 What is this software?
Foswiki by Foswiki
⚠️ Risk & Real-World Impact
Worst Case
Attackers could access sensitive configuration files, user data, or internal documentation, potentially leading to further attacks or data breaches.
Likely Case
Unauthorized access to internal files or information that should be restricted, compromising confidentiality of the Foswiki installation.
If Mitigated
Limited exposure of non-critical information with proper access controls and monitoring in place.
🎯 Exploit Status
The exploit is publicly available and can be executed remotely without authentication.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.1.11
Vendor Advisory: https://foswiki.org/Tasks/Item15600
Restart Required: Yes
Instructions:
1. Backup your Foswiki installation. 2. Download Foswiki 2.1.11 or later from the official website. 3. Replace the affected files with the patched versions. 4. Restart the web server. 5. Verify the patch is applied by checking the version.
🔧 Temporary Workarounds
Restrict access to Changes/Viewfile/Oops
allTemporarily block or restrict access to the vulnerable component using web server configuration.
# Apache example: RewriteRule ^Changes/Viewfile/Oops - [F]
# Nginx example: location ~ ^/Changes/Viewfile/Oops { deny all; }
🧯 If You Can't Patch
- Implement strict network access controls to limit Foswiki access to trusted IPs only.
- Deploy a web application firewall (WAF) with rules to block requests to the vulnerable endpoint.
🔍 How to Verify
Check if Vulnerable:
Check if your Foswiki version is 2.1.10 or earlier by examining the version file or admin interface.
Check Version:
grep 'VERSION' lib/Foswiki.pm | head -1
Verify Fix Applied:
Verify the installed version is 2.1.11 or later and check that the patch commit 31aeecb58b64/d8ed86b10e46 is present.
📡 Detection & Monitoring
Log Indicators:
- Unusual access patterns to Changes/Viewfile/Oops endpoint
- Requests returning sensitive file contents
Network Indicators:
- HTTP requests to /bin/view/Changes/Viewfile/Oops with suspicious parameters
SIEM Query:
source="foswiki_access.log" AND uri="/bin/view/Changes/Viewfile/Oops"