CVE-2026-26187 - Vulnerability Analysis
HighCVSS: 8.1Last Updated: February 13, 2026
lakeFS - Path Traversal
Overview
lakeFS prior to 1.77.0 contains a path traversal vulnerability caused by insufficient path prefix validation in the local block adapter, letting authenticated users read and write files outside their storage boundaries, exploit requires user authentication.
Severity & Score
Impact
Authenticated users can read and write files outside their designated storage, potentially leading to unauthorized data access and modification.
Mitigation
Update to version 1.77.0 or later.
References
Social Media Activity(1 post)
š CVE-2026-26187 - High (8.1) lakeFS is an open-source tool that transforms object storage into a Git-like repositories. Prior to 1.77.0, the local block adapter (pkg/block/local/adapter.go) allows authenticated users to read and write files outside their designated storage bo... š https://www.thehackerwire.com/vulnerability/CVE-2026-26187/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-26187
- Severity
- High
- CVSS Score
- 8.1
- Type
- path_traversal
- Status
- unconfirmed
- EPSS
- 4.7%
- Social Posts
- 1
CWE
- CWE-22
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N