Skip to content
Threat Feed

Tag

File-Write

7 briefs RSS
high advisory

OpenPrinting CUPS Path Traversal Vulnerability (CVE-2026-34978)

CVE-2026-34978 is a path traversal vulnerability in OpenPrinting CUPS that allows writing files outside the CacheDir/rss directory, potentially overwriting the job.cache file.

path traversal cups cve-2026-34978 file write
2r 2t 1c
high advisory

OpenClaw Symlink Vulnerability in SSH Sandbox Tar Upload (CVE-2026-41364)

OpenClaw before 2026.3.31 contains a symlink following vulnerability in SSH sandbox tar upload that allows remote attackers to write arbitrary files by uploading a malicious tar archive containing symlinks, leading to arbitrary file write on the remote host.

OpenClaw symlink file-write sandbox-escape
2r 1t 1c
high advisory

ByteDance DeerFlow Path Traversal and Arbitrary File Write Vulnerability

ByteDance DeerFlow before commit 2176b2b contains a path traversal and arbitrary file write vulnerability in bootstrap-mode custom-agent creation where the agent name validation is bypassed, allowing attackers to write files outside the intended custom-agent directory.

path-traversal file-write bytedance deerflow
2r 1t 1c
critical advisory

Unauthenticated Arbitrary File Write in Saltcorn

Unauthenticated attackers can exploit a vulnerability in Saltcorn versions prior to 1.4.5, 1.5.5, and 1.6.0-beta.4 to write arbitrary files and list directory contents on the server.

saltcorn file-write vulnerability
2r 1t 1c
high advisory

BugSink Authenticated File Write Vulnerability (CVE-2026-40162)

BugSink 2.1.0 is vulnerable to an authenticated file write vulnerability (CVE-2026-40162) allowing an attacker with a valid authentication token to write arbitrary content to the filesystem, potentially leading to code execution or data compromise.

cve-2026-40162 file-write authentication
2r 1t 1c 1i
high advisory

prompts.chat Path Traversal Vulnerability (CVE-2026-22661)

A path traversal vulnerability exists in prompts.chat prior to commit 0f8d4c3, allowing attackers to write arbitrary files to the client system by crafting malicious ZIP archives with unsanitized filenames.

path-traversal file-write code-execution cve-2026-22661 prompts.chat linux
2r 1t 1c
high advisory

@mobilenext/mobile-mcp Path Traversal Vulnerability

The @mobilenext/mobile-mcp package before version 0.0.49 is vulnerable to a Path Traversal vulnerability in the mobile_save_screenshot and mobile_start_screen_recording tools where the `saveTo` and `output` parameters are passed directly to filesystem operations without validation, potentially allowing an attacker to write files outside the intended workspace, leading to privilege escalation and persistence by overwriting sensitive host files.

path-traversal file-write privilege-escalation persistence
2r 2t