DumbAssets Path Traversal Vulnerability (CVE-2026-45230)
DumbAssets version 1.0.11 is vulnerable to a path traversal vulnerability in the POST /api/delete-file endpoint, allowing unauthenticated attackers to delete arbitrary files, including critical files like server.js or package.json, resulting in denial of service.
DumbAssets through version 1.0.11 is susceptible to a path traversal vulnerability identified as CVE-2026-45230. This flaw resides in the POST /api/delete-file endpoint, specifically within the filesToDelete array parameters. Exploitation requires no authentication by default, allowing remote attackers to delete arbitrary files on the system. By injecting ../ sequences, attackers can bypass directory boundary restrictions and traverse outside the intended application directory. The lack of proper input validation enables the deletion of critical files, such as server.js or package.json, leading to a complete denial of service (DoS) condition for the affected application.
Attack Chain
- An unauthenticated attacker sends a
POSTrequest to the/api/delete-fileendpoint. - The attacker crafts the
filesToDeletearray within the request body to include filenames containing path traversal sequences (e.g.,../). - The application receives the
POSTrequest and processes thefilesToDeletearray without proper validation or sanitization of the provided filenames. - The application attempts to resolve the file path based on the attacker-supplied input, leading to directory traversal outside of the intended application directory.
- The application proceeds to delete the files specified in the
filesToDeletearray based on the manipulated file paths. - The attacker targets critical application files such as
server.jsorpackage.jsonusing the path traversal vulnerability. - The targeted critical files are successfully deleted by the application.
- The application experiences a denial of service due to the absence of essential files required for its operation.
Impact
Successful exploitation of this vulnerability allows unauthenticated attackers to delete arbitrary files on the system. This can lead to the deletion of critical application files like server.js or package.json, resulting in a complete denial of service. Given the high CVSS score of 9.1, this vulnerability represents a significant risk. The absence of authentication by default makes exploitation straightforward, increasing the likelihood of successful attacks.
Recommendation
- Deploy the Sigma rule to detect malicious
POSTrequests containing path traversal sequences targeting the/api/delete-fileendpoint. - Inspect web server logs for
POSTrequests to/api/delete-filewith filename parameters containing../sequences. - Apply input validation and sanitization to the
filesToDeleteparameter in the/api/delete-fileendpoint to prevent path traversal attacks. - Enforce authentication on the
/api/delete-fileendpoint to restrict access to authorized users only.
Detection coverage 2
Detects CVE-2026-45230 Exploitation — DumbAssets Path Traversal
criticalDetects CVE-2026-45230 exploitation — POST requests to /api/delete-file with path traversal sequences in the filename.
Detects CVE-2026-45230 Exploitation — DumbAssets Attempted Path Traversal (status 4xx)
highDetects CVE-2026-45230 exploitation — Detects attempted path traversal attacks against DumbAssets by monitoring 4xx status codes when accessing the /api/delete-file endpoint with path traversal sequences.
Detection queries are available on the platform. Get full rules →