INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global malware Energy and Utilities CRITICAL 1h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 3h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 4h Global phishing Multiple sectors HIGH 4h Global insider Cybersecurity Services CRITICAL 4h Global ransomware Multiple sectors (U.S. companies) CRITICAL 5h Global malware Financial Services, Cryptocurrency CRITICAL 5h Global malware Technology and Cloud Services HIGH 5h Global general Financial Services and E-commerce MEDIUM 5h Global data_breach Social Media and Communications CRITICAL 5h Global malware Energy and Utilities CRITICAL 1h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 3h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 4h Global phishing Multiple sectors HIGH 4h Global insider Cybersecurity Services CRITICAL 4h Global ransomware Multiple sectors (U.S. companies) CRITICAL 5h Global malware Financial Services, Cryptocurrency CRITICAL 5h Global malware Technology and Cloud Services HIGH 5h Global general Financial Services and E-commerce MEDIUM 5h Global data_breach Social Media and Communications CRITICAL 5h Global malware Energy and Utilities CRITICAL 1h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 3h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 4h Global phishing Multiple sectors HIGH 4h Global insider Cybersecurity Services CRITICAL 4h Global ransomware Multiple sectors (U.S. companies) CRITICAL 5h Global malware Financial Services, Cryptocurrency CRITICAL 5h Global malware Technology and Cloud Services HIGH 5h Global general Financial Services and E-commerce MEDIUM 5h Global data_breach Social Media and Communications CRITICAL 5h
Vulnerabilities

CVE-2026-22783

Critical
CVE-2026-22783: Critical Arbitrary File Deletion Vulnerability in DFIR-IRIS Collaborative Platform
CWE-73 — Weakness Type
Published: Jan 12, 2026  ·  Modified: Feb 28, 2026  ·  Source: NVD
CVSS v3
9.6
🔗 NVD Official
📄 Description (English)

Iris is a web collaborative platform that helps incident responders share technical details during investigations. Prior to 2.4.24, the DFIR-IRIS datastore file management system has a vulnerability where mass assignment of the file_local_name field combined with path trust in the delete operation enables authenticated users to delete arbitrary filesystem paths. The vulnerability manifests through a three-step attack chain: authenticated users upload a file to the datastore, update the file's file_local_name field to point to an arbitrary filesystem path through mass assignment, then trigger the delete operation which removes the target file without path validation. This vulnerability is fixed in 2.4.24.

🤖 AI Executive Summary

DFIR-IRIS datastore file management system prior to version 2.4.24 contains a critical vulnerability allowing authenticated users to delete arbitrary filesystem paths through mass assignment of the file_local_name field combined with insufficient path validation in delete operations. This three-step attack chain enables complete compromise of file system integrity for organizations using vulnerable versions.

📄 Description (Arabic)

تحتوي ثغرة CVE-2026-22783 على سلسلة هجومية معقدة تتضمن ثلاث خطوات: تحميل ملف، تعديل حقل file_local_name عبر الإسناد الجماعي، وتنفيذ عملية الحذف. يسمح هذا للمستخدمين المصرح لهم بحذف أي ملفات على النظام دون التحقق من صحة المسار. الثغرة تؤثر على جميع الإصدارات السابقة للإصدار 2.4.24 من DFIR-IRIS.

🤖 ملخص تنفيذي (AI)

نظام إدارة ملفات DFIR-IRIS في الإصدارات السابقة للإصدار 2.4.24 يحتوي على ثغرة حرجة تسمح للمستخدمين المصرح لهم بحذف مسارات نظام الملفات العشوائية من خلال الإسناد الجماعي لحقل file_local_name. يمكن لهذه السلسلة الهجومية ذات الخطوات الثلاث أن تؤدي إلى تعطيل كامل لسلامة نظام الملفات.

🤖 AI Intelligence Analysis Analyzed: Apr 12, 2026 12:32
🇸🇦 Saudi Arabia Impact Assessment
Saudi Relevance: high
🏢 Affected Saudi Sectors
government telecom banking healthcare
⚖️ Saudi Risk Score (AI)
10.0
/ 10.0
🔧 Remediation Steps (English)
Immediately upgrade DFIR-IRIS to version 2.4.24 or later. Implement strict input validation and whitelisting for file_local_name field assignments. Disable mass assignment for sensitive file management fields. Apply principle of least privilege to file deletion operations. Implement comprehensive audit logging for all file operations. Restrict datastore access to authorized personnel only.
🔧 خطوات المعالجة (العربية)
قم بترقية DFIR-IRIS فوراً إلى الإصدار 2.4.24 أو أحدث. طبق التحقق الصارم من المدخلات والقوائم البيضاء لتعيينات حقل file_local_name. عطل الإسناد الجماعي للحقول الحساسة في إدارة الملفات. طبق مبدأ أقل امتياز لعمليات حذف الملفات. طبق تسجيل تدقيق شامل لجميع عمليات الملفات. قيد الوصول إلى مستودع البيانات للموظفين المصرح لهم فقط.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
5.1.1 5.1.2 5.2.1 5.2.2 5.3.1
🔵 SAMA CSF
AC-2 AC-3 AC-6 AU-2 AU-12 SI-4
🟡 ISO 27001:2022
A.6.1.2 A.9.1.1 A.9.2.1 A.9.2.5 A.9.4.3 A.12.4.1
📦 Affected Products / CPE 1 entries
dfir-iris:iris
📊 CVSS Score
9.6
/ 10.0 — Critical
📊 CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H
Attack VectorN — None / Network
Attack ComplexityL — Low / Local
Privileges RequiredL — Low / Local
User InteractionN — None / Network
ScopeC — Changed
ConfidentialityN — None / Network
IntegrityH — High
AvailabilityH — High
📋 Quick Facts
Severity Critical
CVSS Score9.6
CWECWE-73
EPSS0.08%
Exploit No
Patch ✓ Yes
Published 2026-01-12
Source Feed nvd
Views 2
🇸🇦 Saudi Risk Score
10.0
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
patch-available CWE-73
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.