Vulnerability Description
A weakness has been identified in o2oa up to 10.0. This affects the function FileAction of the file FileAction.java of the component URL Fetching. Executing a manipulation of the argument fileUrl can lead to server-side request forgery. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://github.com/o2oa/o2oa/
- https://github.com/o2oa/o2oa/issues/195
- https://vuldb.com/submit/803073
- https://vuldb.com/vuln/359951
- https://vuldb.com/vuln/359951/cti
FAQ
What is CVE-2026-7291?
CVE-2026-7291 is a vulnerability with a CVSS score of 6.3 (MEDIUM). A weakness has been identified in o2oa up to 10.0. This affects the function FileAction of the file FileAction.java of the component URL Fetching. Executing a manipulation of the argument fileUrl can ...
How severe is CVE-2026-7291?
CVE-2026-7291 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-7291?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.