{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/tags/cve-2026-32727/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[{"cvss":8.1,"id":"CVE-2026-32727"}],"_cs_exploited":false,"_cs_products":[],"_cs_severities":["high"],"_cs_tags":["scitokens","path-traversal","cve-2026-32727","vulnerability"],"_cs_type":"advisory","_cs_vendors":[],"content_html":"\u003cp\u003eThe SciTokens library, a reference implementation for generating and using SciTokens, is susceptible to a path traversal vulnerability affecting versions prior to 1.9.7. This vulnerability, identified as CVE-2026-32727, stems from the library\u0026rsquo;s Enforcer component. An attacker can exploit this flaw by crafting a malicious token containing a scope claim with \u0026ldquo;dot-dot\u0026rdquo; (..) sequences. These sequences allow the attacker to navigate outside the intended directory restriction, potentially accessing…\u003c/p\u003e\n","date_modified":"2026-03-31T03:15:57Z","date_published":"2026-03-31T03:15:57Z","id":"/briefs/2024-01-23-scitokens-path-traversal/","summary":"A path traversal vulnerability (CVE-2026-32727) in SciTokens library versions prior to 1.9.7 allows attackers to bypass intended directory restrictions using dot-dot sequences in the scope claim of a token due to improper path normalization.","title":"SciTokens Library Path Traversal Vulnerability (CVE-2026-32727)","url":"https://feed.craftedsignal.io/briefs/2024-01-23-scitokens-path-traversal/"}],"language":"en","title":"CraftedSignal Threat Feed — Cve-2026-32727","version":"https://jsonfeed.org/version/1.1"}