CVE-2026-22783 Overview
CVE-2026-22783 is a critical arbitrary file deletion vulnerability in DFIR-IRIS, a web collaborative platform designed to help incident responders share technical details during investigations. The vulnerability exists in the datastore file management system, where improper handling of the file_local_name field combined with insufficient path validation in the delete operation allows authenticated users to delete arbitrary files on the filesystem.
Critical Impact
Authenticated attackers can leverage this vulnerability to delete any file accessible to the web application, potentially leading to system instability, data loss, or complete denial of service through deletion of critical system files.
Affected Products
- DFIR-IRIS (iris-web) versions prior to 2.4.24
Discovery Timeline
- 2026-01-12 - CVE CVE-2026-22783 published to NVD
- 2026-01-13 - Last updated in NVD database
Technical Details for CVE-2026-22783
Vulnerability Analysis
This vulnerability falls under CWE-73 (External Control of File Name or Path), which occurs when an application allows user-controlled input to influence file path operations without proper validation. The DFIR-IRIS platform's datastore file management system fails to properly restrict which file paths can be specified and subsequently deleted.
The attack chain exploits a mass assignment vulnerability combined with a trusted path deletion operation. When users upload files to the datastore, the application stores metadata including the file_local_name field. The vulnerability allows authenticated users to modify this field to point to any filesystem path. When the delete operation is subsequently triggered, the application removes the file at the specified path without validating whether it falls within the expected datastore directory.
The impact is significant because the application trusts the file_local_name value during deletion without performing path canonicalization or boundary checks. This allows attackers to specify paths using absolute paths or path traversal sequences to target files outside the intended datastore location.
Root Cause
The root cause of CVE-2026-22783 is twofold: first, a mass assignment vulnerability that allows authenticated users to modify the file_local_name field to arbitrary values, and second, insufficient path validation in the delete operation that blindly trusts this user-controlled field without verifying the target path is within the expected datastore boundaries.
Attack Vector
The attack is executed through a three-step chain:
File Upload: An authenticated user uploads a legitimate file to the DFIR-IRIS datastore, creating a file record with associated metadata.
Mass Assignment: The attacker modifies the file_local_name field of the uploaded file's record to point to a target file on the filesystem (e.g., /etc/passwd, application configuration files, or database files).
Triggered Deletion: The attacker initiates the delete operation for the uploaded file. The application uses the modified file_local_name value to locate and delete the file, resulting in the removal of the attacker-specified target file.
This network-accessible attack requires low privileges (any authenticated user) and no user interaction, making it easily exploitable in environments where multiple users have access to the DFIR-IRIS platform.
Detection Methods for CVE-2026-22783
Indicators of Compromise
- Unexpected file deletions on the server hosting DFIR-IRIS, particularly system or configuration files
- Datastore file records with file_local_name values containing absolute paths or path traversal sequences (e.g., ../, /etc/)
- Application errors or crashes resulting from missing critical files
- Audit logs showing file metadata modifications followed by delete operations
Detection Strategies
- Monitor file integrity of critical system files and application configuration on DFIR-IRIS servers
- Implement logging for all datastore file operations, particularly metadata updates to the file_local_name field
- Set up alerts for delete operations targeting paths outside the expected datastore directory
- Review application logs for suspicious patterns of file upload, metadata modification, and deletion sequences
Monitoring Recommendations
- Enable comprehensive audit logging for all file management API endpoints in DFIR-IRIS
- Deploy file integrity monitoring (FIM) solutions on servers hosting the application
- Configure alerts for any modifications to sensitive system files
- Regularly audit user activity within the DFIR-IRIS platform for unusual file operations
How to Mitigate CVE-2026-22783
Immediate Actions Required
- Upgrade DFIR-IRIS to version 2.4.24 or later immediately
- Audit existing datastore file records for suspicious file_local_name values
- Review server filesystem for any unexpected file deletions
- Restrict access to the DFIR-IRIS platform to only trusted users until patching is complete
Patch Information
The vulnerability has been addressed in DFIR-IRIS version 2.4.24. The fix implements proper path validation to ensure that file deletion operations only affect files within the intended datastore directory. Organizations should upgrade to this version or later to remediate the vulnerability.
For detailed information about the fix, refer to the GitHub Commit Details and the GitHub Security Advisory.
Workarounds
- Implement network-level access controls to restrict DFIR-IRIS access to only essential personnel
- Deploy a web application firewall (WAF) with rules to detect and block path traversal patterns in API requests
- Run the DFIR-IRIS application with minimal filesystem permissions to limit the scope of potential file deletions
- Consider temporarily disabling the datastore file management feature if it is not critical to operations
# Example: Restrict filesystem permissions for DFIR-IRIS application user
# Ensure the application user has minimal write/delete access outside datastore
chown -R iris-app:iris-app /opt/iris/datastore
chmod 700 /opt/iris/datastore
# Verify the application runs as a non-privileged user
ps aux | grep iris
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

