<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-6855 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-6855/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 22 Apr 2026 13:16:22 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-6855/feed.xml" rel="self" type="application/rss+xml"/><item><title>InstructLab Path Traversal Vulnerability (CVE-2026-6855)</title><link>https://feed.craftedsignal.io/briefs/2026-04-instructlab-path-traversal/</link><pubDate>Wed, 22 Apr 2026 13:16:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-instructlab-path-traversal/</guid><description>A local attacker can exploit a path traversal vulnerability in InstructLab by manipulating the `logs_dir` parameter, leading to arbitrary file creation and modification.</description><content:encoded>&lt;p>CVE-2026-6855 describes a path traversal vulnerability found in InstructLab, a tool or platform that allows for interactive instruction or learning sessions. A local attacker can exploit this vulnerability by manipulating the &lt;code>logs_dir&lt;/code> parameter within the chat session handler. This manipulation allows the attacker to bypass intended directory restrictions and gain the ability to create new directories and write files to arbitrary locations on the affected system. The vulnerability was…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>instructlab</category><category>cve-2026-6855</category></item></channel></rss>