<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Arbitrary-File-Read — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/arbitrary-file-read/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 02 May 2026 12:16:16 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/arbitrary-file-read/feed.xml" rel="self" type="application/rss+xml"/><item><title>Salon Booking System WordPress Plugin Arbitrary File Read Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-arbitrary-file-read/</link><pubDate>Sat, 02 May 2026 12:16:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-arbitrary-file-read/</guid><description>The Salon Booking System WordPress plugin is vulnerable to arbitrary file read, allowing unauthenticated attackers to exfiltrate local files by manipulating file-field values in booking confirmation emails.</description><content:encoded><![CDATA[<p>The Salon Booking System – Free Version plugin for WordPress, versions up to and including 10.30.25, contains an arbitrary file read vulnerability. This flaw stems from the plugin&rsquo;s public booking flow, where it accepts attacker-controlled file-field values. These values are subsequently used as trusted paths when creating email attachments for booking confirmations. This allows an unauthenticated attacker to supply a path to any file accessible to the web server, triggering its inclusion as an attachment in the booking confirmation email, effectively enabling arbitrary file exfiltration. Exploitation requires no authentication and can be triggered remotely.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker accesses the public booking form of a WordPress site running the vulnerable Salon Booking System plugin.</li>
<li>The attacker crafts a malicious request to the booking form, injecting a file path (e.g., <code>/etc/passwd</code>) into a file-field parameter.</li>
<li>The plugin processes the booking request and stores the attacker-supplied file path.</li>
<li>The plugin generates a booking confirmation email.</li>
<li>The plugin uses the stored, attacker-controlled file path to attach the specified file to the confirmation email.</li>
<li>The booking confirmation email, now containing the arbitrary file as an attachment, is sent to the user who initiated the booking (which could be the attacker or an unwitting third party).</li>
<li>The attacker retrieves the email (if sent to the attacker) or intercepts it (if sent to a third party) and extracts the attached file.</li>
<li>The attacker gains unauthorized access to the contents of the exfiltrated file.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthenticated attackers to read arbitrary files from the affected WordPress server. This could lead to the disclosure of sensitive information, such as configuration files, database credentials, or other confidential data. The vulnerability affects versions of the Salon Booking System plugin up to and including 10.30.25. The number of affected WordPress installations is unknown, but could be substantial given the plugin&rsquo;s popularity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Salon Booking System plugin to the latest version to patch CVE-2026-6320.</li>
<li>Monitor web server logs (category <code>webserver</code>, product <code>linux</code>) for suspicious requests containing absolute or relative file paths in file-field parameters, using a detection rule similar to the ones provided below.</li>
<li>Implement strict input validation and sanitization for all user-supplied data, especially file paths.</li>
<li>Review and restrict file system permissions to limit the files accessible to the web server process.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>arbitrary-file-read</category><category>wordpress</category><category>plugin-vulnerability</category><category>cve</category></item><item><title>OpenClaw Arbitrary File Read and Credential Exfiltration Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-file-read/</link><pubDate>Fri, 03 Apr 2026 02:53:58 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-file-read/</guid><description>The openclaw package is vulnerable to arbitrary file read and credential exfiltration due to media local roots self-whitelisting in `appendLocalMediaParentRoots`, allowing a model to initiate arbitrary host file reads, potentially leading to credential exfiltration.</description><content:encoded><![CDATA[<p>The <code>openclaw</code> npm package, versions 2026.3.28 and earlier, contains a vulnerability related to media local roots self-whitelisting in the <code>appendLocalMediaParentRoots</code> function. This flaw enables a malicious model to initiate arbitrary file reads on the host system. While the tool-fs root expansion requires prior configuration, the vulnerability can still be exploited, resulting in a narrower impact than a default-critical scenario. The vulnerability was reported by @tdjackey and patched in version 2026.3.31. Defenders should ensure they are running version 2026.3.31 or later of the <code>openclaw</code> package to mitigate the risk of arbitrary file read and potential credential exfiltration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A malicious actor crafts or modifies an existing OpenClaw model.</li>
<li>The model includes instructions to trigger the <code>appendLocalMediaParentRoots</code> function within the <code>src/media/local-roots.ts</code> file.</li>
<li>Due to the self-whitelisting behavior, the function expands the allowed media parent directories, potentially including sensitive system directories.</li>
<li>The model leverages the expanded directory access to request the reading of arbitrary files on the host system.</li>
<li>The <code>openclaw</code> application processes the model&rsquo;s file read request without proper validation due to the bypassed whitelisting.</li>
<li>Sensitive files, such as configuration files or credential stores, are read by the application.</li>
<li>The extracted data, including credentials, are then potentially exfiltrated by the malicious model.</li>
<li>The attacker gains unauthorized access to sensitive data or systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to read arbitrary files on the host system where the <code>openclaw</code> application is running. This can lead to the exfiltration of sensitive information, including credentials, API keys, or other confidential data. While the exact number of affected installations is unknown, any system running a vulnerable version of the <code>openclaw</code> package (&lt;=2026.3.28) is susceptible. The impact is narrowed because the tool-fs root expansion requires prior configuration.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the <code>openclaw</code> npm package to version 2026.3.31 or later to remediate the vulnerability (reference: Affected Packages / Versions).</li>
<li>Implement input validation and sanitization to prevent arbitrary file paths from being processed by the <code>appendLocalMediaParentRoots</code> function (reference: <code>src/media/local-roots.ts</code>).</li>
<li>Deploy the Sigma rule to detect attempts to access sensitive files via the <code>openclaw</code> application (reference: Sigma rule below).</li>
<li>Review and restrict the tool-fs root expansion configuration to minimize the impact of potential exploitation (reference: Current Maintainer Triage).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>arbitrary-file-read</category><category>credential-exfiltration</category><category>openclaw</category><category>npm</category></item><item><title>i18next-fs-backend Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-25-i18next-fs-backend-path-traversal/</link><pubDate>Thu, 25 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-25-i18next-fs-backend-path-traversal/</guid><description>i18next-fs-backend versions before 2.6.4 are vulnerable to path traversal due to insufficient sanitization of the lng and ns values, potentially allowing attackers to read arbitrary files, overwrite files, or execute code if .js or .ts locale files are in use.</description><content:encoded><![CDATA[<p>The i18next-fs-backend library, a file system backend for the i18next internationalization framework, is vulnerable to a path traversal attack in versions prior to 2.6.4. This vulnerability arises from the unsanitized use of the <code>lng</code> (language) and <code>ns</code> (namespace) parameters when constructing file paths for loading and writing locale files. If an application exposes the language code to user input, an attacker can craft a malicious <code>lng</code> or <code>ns</code> value containing directory traversal sequences (e.g., <code>../</code>) to escape the intended locale directory. Successful exploitation can lead to arbitrary file read, arbitrary file overwrite, and, if <code>.js</code> or <code>.ts</code> files are used for localization, arbitrary code execution. This vulnerability highlights the importance of input validation, especially when constructing file paths from user-controlled data. The vulnerability was patched in version 2.6.4.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an application using a vulnerable version of <code>i18next-fs-backend</code> (versions prior to 2.6.4) and exposes the language code to user input via query parameters (e.g., <code>?lng=</code>), cookies, or request headers.</li>
<li>The attacker crafts a malicious <code>lng</code> value containing directory traversal sequences, such as <code>../../../../etc</code>, to target sensitive files outside the intended locale directory.</li>
<li>The attacker sends a request to the application with the crafted <code>lng</code> parameter.</li>
<li>The application passes the unsanitized <code>lng</code> value to the <code>i18next.t()</code> function.</li>
<li>The <code>i18next-fs-backend</code> library interpolates the malicious <code>lng</code> value into the <code>loadPath</code> configuration option, without proper validation.  For example, <code>loadPath: '/locales/{{lng}}/{{ns}}.json'</code> becomes <code>/locales/../../../../etc/{{ns}}.json</code>.</li>
<li>The backend attempts to read the file specified by the crafted path (e.g., <code>/etc/passwd</code>).</li>
<li>If successful, the contents of the targeted file are returned as a translation resource, potentially exposing sensitive information. If the attacker crafted the <code>lng</code> or <code>ns</code> value to point to a <code>.js</code> or <code>.ts</code> file containing malicious code, the backend will execute the file using <code>eval()</code>, leading to arbitrary code execution on the server.</li>
<li>Alternatively, if the application attempts to write a missing translation key using the crafted path (via <code>addPath</code>), the attacker could overwrite arbitrary files on the system, potentially leading to application compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can have severe consequences. Arbitrary file read allows attackers to access sensitive data, such as configuration files, database credentials, or application source code. Arbitrary file overwrite can lead to application malfunction or complete compromise. If the application uses <code>.js</code> or <code>.ts</code> files for localization and the attacker is able to inject malicious code into those files through path traversal, arbitrary code execution can result, potentially allowing the attacker to gain full control of the server. The number of victims depends on the popularity and configuration of applications using the vulnerable <code>i18next-fs-backend</code> library.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to <code>i18next-fs-backend</code> version 2.6.4 or later to patch the path traversal vulnerability as this version introduces the <code>isSafePathSegment</code> and <code>interpolatePath</code> functions to sanitize the path.</li>
<li>If upgrading is not immediately feasible, sanitize the <code>lng</code> and <code>ns</code> values at the application boundary before passing them to <code>i18next</code>. Reject values containing <code>..</code>, <code>/</code>, <code>\</code>, control characters, and limit the length to prevent path traversal as mentioned in the advisory.</li>
<li>If using <code>.js</code> or <code>.ts</code> locale files, carefully review them for any suspicious or unexpected code. The advisory highlights that these files must be treated as trusted code.</li>
<li>Monitor web server logs for suspicious requests containing directory traversal sequences in the <code>lng</code> or <code>ns</code> parameters. Deploy the first Sigma rule for this purpose.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>i18next</category><category>arbitrary-file-read</category><category>arbitrary-file-write</category><category>code-execution</category></item></channel></rss>