CloakBrowser cloakserve Unauthenticated Path Traversal Leading to Arbitrary Directory Deletion (CVE-2026-45727)
An unauthenticated path traversal vulnerability exists in CloakBrowser's cloakserve component (versions 0.3.27 and earlier) where a crafted fingerprint query parameter with path traversal sequences can be used to delete arbitrary directories accessible to the service user (CVE-2026-45727).
CloakBrowser’s cloakserve component is vulnerable to an unauthenticated path traversal attack. The vulnerability stems from the direct use of the user-supplied fingerprint query parameter as a filesystem path component when creating Chrome profile directories. An attacker, without needing authentication, can send a crafted fingerprint value containing path traversal sequences to manipulate the user_data_dir resolution to point outside the intended data_dir. This vulnerability affects CloakBrowser versions 0.3.27 and earlier. The default configuration of cloakserve binding to 0.0.0.0 exacerbates the issue by making it network-exposed. By exploiting this vulnerability, attackers can delete arbitrary directories accessible to the service user when Chrome fails to start or during process cleanup.
Attack Chain
- The attacker sends an HTTP request to the exposed
cloakserveport. - The request includes a crafted
fingerprintquery parameter containing path traversal sequences (e.g.,../). cloakserveuses thefingerprintparameter to construct a path for the Chrome profile directory (user_data_dir).- The path traversal sequences in the
fingerprintparameter causeuser_data_dirto resolve outside the configureddata_dir. - Chrome attempts to start using the manipulated
user_data_dir. - Chrome fails to start, potentially due to issues with the traversed path or profile directory.
- During cleanup or when the process is terminated,
shutil.rmtree()is called to delete theuser_data_dir. - Due to the path traversal,
shutil.rmtree()deletes an arbitrary directory accessible to the service user.
Impact
Successful exploitation allows an unauthenticated attacker with network access to the cloakserve port to delete arbitrary directories accessible to the service user. The number of affected installations is unknown. This vulnerability allows for denial of service or potentially more severe impacts depending on the contents and permissions of the deleted directories.
Recommendation
- Upgrade CloakBrowser to version 0.3.28 or later to remediate the vulnerability as advised in the overview.
- Restrict network access to the
cloakserveport (typically port 8080) as described in the mitigations section of the linked advisory. - Deploy the Sigma rule “Detect CloakBrowser Path Traversal Attempt via Crafted Fingerprint” to monitor for suspicious
fingerprintparameters containing path traversal sequences.
Detection coverage 2
Detect CloakBrowser Path Traversal Attempt via Crafted Fingerprint
highDetects CVE-2026-45727 exploitation attempt — Monitors HTTP requests to the `cloakserve` endpoint with a crafted `fingerprint` parameter containing path traversal sequences.
Detect CloakBrowser cloakserve Binding to All Interfaces
lowDetects CloakBrowser cloakserve binding to all interfaces (0.0.0.0) which could expose it to unnecessary network traffic.
Detection queries are available on the platform. Get full rules →