Description
Hyland OnBase contains an unauthenticated .NET Remoting exposure in the OnBase Workflow Timer Service (Hyland.Core.Workflow.NTService.exe). An attacker who can reach the service can send crafted .NET Remoting requests to default HTTP channel endpoints on TCP/8900 (e.g., TimerServiceAPI.rem and TimerServiceEvents.rem for Workflow) to trigger unsafe object unmarshalling, enabling arbitrary file read/write. By writing attacker-controlled content into web-accessible locations or chaining with other OnBase features, this can lead to remote code execution. The same primitive can be abused by supplying a UNC path to coerce outbound NTLM authentication (SMB coercion) to an attacker-controlled host.
INFO
Published Date :
2026-02-13T15:21:48.928Z
Last Modified :
2026-03-23T15:44:15.502Z
Source :
VulnCheck
AFFECTED PRODUCTS
The following products are affected by CVE-2026-26221 vulnerability.
| Vendors | Products |
|---|---|
| Hyland |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-26221.