Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 13 May 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:ivanti:xtraction:*:*:*:*:*:*:*:* |
Wed, 13 May 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ivanti
Ivanti xtraction |
|
| Vendors & Products |
Ivanti
Ivanti xtraction |
Tue, 12 May 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Remote Authenticated File Read and Arbitrary File Write via Unrestricted File Name in Ivanti Xtraction |
Tue, 12 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 12 May 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | External control of a file name in Ivanti Xtraction before version 2026.2 allows a remote authenticated attacker to read sensitive files and write arbitrary HTML files to a web directory, leading to information disclosure and possible client-side attacks. | |
| Weaknesses | CWE-73 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: ivanti
Published:
Updated: 2026-05-12T15:44:12.334Z
Reserved: 2026-05-06T16:56:11.386Z
Link: CVE-2026-8043
Updated: 2026-05-12T15:44:08.484Z
Status : Analyzed
Published: 2026-05-12T15:16:17.153
Modified: 2026-05-13T20:34:20.310
Link: CVE-2026-8043
No data.
OpenCVE Enrichment
Updated: 2026-05-13T10:38:44Z