A vulnerability was found in CoCoTeaNet CyreneAdmin up to 1.3.0. This affects an unknown part of the file /api/system/user/getAvatar of the component Image Handler. Performing a manipulation of the argument Avatar results in path traversal. The attack can be initiated remotely. The exploit has been made public and could be used.
Metrics
Affected Vendors & Products
References
History
Thu, 19 Feb 2026 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cocoteanet
Cocoteanet cyreneadmin |
|
| Vendors & Products |
Cocoteanet
Cocoteanet cyreneadmin |
Thu, 19 Feb 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was found in CoCoTeaNet CyreneAdmin up to 1.3.0. This affects an unknown part of the file /api/system/user/getAvatar of the component Image Handler. Performing a manipulation of the argument Avatar results in path traversal. The attack can be initiated remotely. The exploit has been made public and could be used. | |
| Title | CoCoTeaNet CyreneAdmin Image getAvatar path traversal | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published: 2026-02-19T02:02:06.735Z
Updated: 2026-02-19T02:02:06.735Z
Reserved: 2026-02-18T14:20:35.082Z
Link: CVE-2026-2692
No data.
Status : Awaiting Analysis
Published: 2026-02-19T07:17:48.470
Modified: 2026-02-19T15:52:39.260
Link: CVE-2026-2692
No data.