<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-5027 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-5027/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 27 Mar 2026 15:17:04 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-5027/feed.xml" rel="self" type="application/rss+xml"/><item><title>Path Traversal Vulnerability in API File Upload Endpoint (CVE-2026-5027)</title><link>https://feed.craftedsignal.io/briefs/2026-03-path-traversal-api/</link><pubDate>Fri, 27 Mar 2026 15:17:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-path-traversal-api/</guid><description>The 'POST /api/v2/files' endpoint is vulnerable to path traversal due to improper sanitization of the 'filename' parameter, potentially allowing attackers to write files to arbitrary locations on the filesystem and achieve remote code execution.</description><content:encoded><![CDATA[<p>CVE-2026-5027 exposes a critical vulnerability in the &lsquo;POST /api/v2/files&rsquo; endpoint, where the &lsquo;filename&rsquo; parameter within multipart form data is not properly sanitized. This flaw allows an attacker to manipulate the filename by injecting path traversal sequences such as &lsquo;../&rsquo;, leading to the ability to write files to arbitrary locations on the server&rsquo;s filesystem. This vulnerability was reported by Tenable Network Security, Inc. and has a CVSS v3.1 base score of 8.8 (HIGH). Successful…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>path-traversal</category><category>file-upload</category><category>cve-2026-5027</category><category>web-application</category></item></channel></rss>