Vulnerability Description
The LabOne Web Server, backing the LabOne User Interface, contains insufficient input validation in its file access functionality. An unauthenticated attacker could exploit this vulnerability to read arbitrary files on the host system that are accessible to the operating system user running the LabOne software. Additionally, the Web Server does not sufficiently restrict cross-origin requests, which could allow a remote attacker to trigger file access from a victim's browser by directing the victim to a malicious website. The vulnerability is only exploitable when the LabOne Web Server is running. Installations using only the LabOne APIs without starting the Web Server are not exposed.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://www.zhinst.com/support/download-center/
- https://www.zhinst.com/support/security/2026/zi-sa-2026-001/
FAQ
What is CVE-2026-6903?
CVE-2026-6903 is a vulnerability with a CVSS score of 7.5 (HIGH). The LabOne Web Server, backing the LabOne User Interface, contains insufficient input validation in its file access functionality. An unauthenticated attacker could exploit this vulnerability to read ...
How severe is CVE-2026-6903?
CVE-2026-6903 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-6903?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.