<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>File-Write — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/file-write/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 30 Apr 2026 08:46:41 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/file-write/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenPrinting CUPS Path Traversal Vulnerability (CVE-2026-34978)</title><link>https://feed.craftedsignal.io/briefs/2026-05-cups-path-traversal/</link><pubDate>Thu, 30 Apr 2026 08:46:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cups-path-traversal/</guid><description>CVE-2026-34978 is a path traversal vulnerability in OpenPrinting CUPS that allows writing files outside the CacheDir/rss directory, potentially overwriting the job.cache file.</description><content:encoded><![CDATA[<p>CVE-2026-34978 is a path traversal vulnerability affecting OpenPrinting CUPS, a modular printing system that allows a computer to act as a print server. The vulnerability exists within the RSS notify-recipient-uri functionality, which improperly validates file paths. By crafting a malicious URI, an attacker can write files outside the intended CacheDir/rss directory. This can lead to the overwriting of critical system files, such as job.cache, potentially disrupting print services and, in some scenarios, leading to arbitrary code execution. This vulnerability was disclosed by Microsoft and requires immediate attention from system administrators to prevent potential exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious RSS notify-recipient-uri containing a path traversal sequence (e.g., &ldquo;../&rdquo;).</li>
<li>The crafted URI is submitted to the CUPS server through a print job request or a configuration setting.</li>
<li>CUPS processes the URI and attempts to write a file to the specified location.</li>
<li>Due to the path traversal vulnerability, the file is written outside the intended CacheDir/rss directory.</li>
<li>The attacker overwrites a critical file, such as job.cache, with malicious content.</li>
<li>The CUPS server attempts to access the overwritten file.</li>
<li>If job.cache is successfully overwritten, the attacker can gain control of the print queue or cause a denial of service by corrupting the print system&rsquo;s state.</li>
<li>In a more advanced scenario, the attacker could potentially achieve arbitrary code execution by overwriting other binaries or configuration files.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-34978 can lead to denial of service by corrupting the printing system state. By overwriting critical CUPS files, an attacker can disrupt printing services. In more critical scenarios, the vulnerability could be leveraged to achieve arbitrary code execution, potentially allowing the attacker to gain complete control over the affected system. The scope of the impact is dependent on the permissions of the CUPS process and the specific files that are overwritten.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security patch provided by OpenPrinting to address CVE-2026-34978.</li>
<li>Monitor CUPS server logs for suspicious activity related to file writes outside the CacheDir/rss directory. Consider deploying the provided Sigma rule <code>Detect CUPS Path Traversal File Write</code> to identify such attempts.</li>
<li>Implement strict input validation on any user-supplied data that is used to construct file paths within CUPS.</li>
<li>Regularly review and audit CUPS configuration settings to ensure that they are secure and do not allow for path traversal vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path traversal</category><category>cups</category><category>cve-2026-34978</category><category>file write</category></item><item><title>OpenClaw Symlink Vulnerability in SSH Sandbox Tar Upload (CVE-2026-41364)</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-symlink/</link><pubDate>Tue, 28 Apr 2026 00:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-symlink/</guid><description>OpenClaw before 2026.3.31 contains a symlink following vulnerability in SSH sandbox tar upload that allows remote attackers to write arbitrary files by uploading a malicious tar archive containing symlinks, leading to arbitrary file write on the remote host.</description><content:encoded><![CDATA[<p>OpenClaw versions before 2026.3.31 are vulnerable to a symlink following issue within the SSH sandbox tar upload functionality. This vulnerability, identified as CVE-2026-41364, allows a remote attacker with the ability to upload tar archives to the OpenClaw instance to potentially escape the intended sandbox environment. By crafting a malicious tar archive containing carefully constructed symbolic links, an attacker can overwrite arbitrary files on the remote host, leading to a compromise of the system&rsquo;s integrity. This vulnerability was reported and patched in version 2026.3.31. Defenders need to ensure they are running patched versions to mitigate the risk of exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the OpenClaw instance via SSH, gaining access to the restricted sandbox environment.</li>
<li>Attacker crafts a malicious tar archive containing symbolic links pointing outside the intended sandbox directory. These symlinks are designed to target specific files or directories on the host system that the attacker wishes to overwrite.</li>
<li>Attacker uploads the malicious tar archive to the OpenClaw instance using the SSH sandbox tar upload functionality.</li>
<li>OpenClaw extracts the contents of the uploaded tar archive without properly validating or restricting the target paths of the symbolic links.</li>
<li>During extraction, the symbolic links are followed, causing files to be written outside the intended sandbox directory.</li>
<li>The attacker overwrites arbitrary files on the remote host with attacker-controlled content.</li>
<li>The attacker achieves arbitrary code execution or persistence by overwriting critical system files or configuration files.</li>
<li>The attacker escalates privileges by modifying binaries used by privileged users.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker with low privileges to write arbitrary files on the OpenClaw server. This can lead to a variety of impacts, including arbitrary code execution, privilege escalation, and denial of service. An attacker could potentially gain complete control over the OpenClaw server by overwriting critical system files. Given the potential for complete system compromise, this vulnerability poses a significant risk to organizations using affected versions of OpenClaw.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.3.31 or later to patch CVE-2026-41364.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious Tar Archive Upload with Symlinks&rdquo; to detect attempts to upload malicious tar archives containing symbolic links.</li>
<li>Monitor SSH logs for suspicious activity related to tar archive uploads to the OpenClaw instance.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>symlink</category><category>file-write</category><category>sandbox-escape</category></item><item><title>ByteDance DeerFlow Path Traversal and Arbitrary File Write Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-deerflow-path-traversal/</link><pubDate>Fri, 17 Apr 2026 17:17:09 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-deerflow-path-traversal/</guid><description>ByteDance DeerFlow before commit 2176b2b contains a path traversal and arbitrary file write vulnerability in bootstrap-mode custom-agent creation where the agent name validation is bypassed, allowing attackers to write files outside the intended custom-agent directory.</description><content:encoded><![CDATA[<p>ByteDance DeerFlow, a software of unknown purpose, prior to commit 2176b2b, is vulnerable to path traversal and arbitrary file write. The vulnerability lies within the bootstrap-mode custom-agent creation process, specifically due to insufficient validation of the agent name. This flaw allows attackers to bypass intended directory restrictions and write files to arbitrary locations on the system, provided they have the necessary filesystem permissions. The vulnerability was reported on April 17, 2026 and has been assigned CVE-2026-40518. Exploitation of this vulnerability could lead to privilege escalation and system compromise. Defenders should prioritize patching or mitigating this vulnerability to prevent unauthorized file modifications.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains low-privileged access to the DeerFlow application.</li>
<li>Attacker initiates the creation of a custom agent in bootstrap mode.</li>
<li>The attacker crafts a malicious agent name containing path traversal sequences (e.g., &ldquo;../&rdquo;, absolute paths).</li>
<li>The DeerFlow application fails to properly validate the agent name.</li>
<li>The application uses the attacker-supplied agent name to create directories.</li>
<li>The path traversal in the agent name allows the application to create directories outside the intended custom-agent directory.</li>
<li>The attacker uploads files as part of the custom agent creation.</li>
<li>The application writes these files to the attacker-controlled location, resulting in arbitrary file write.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to write arbitrary files to the file system, potentially overwriting system files or planting malicious executables. This could lead to privilege escalation, arbitrary code execution, and complete system compromise. While the number of affected installations is unknown, any system running a vulnerable version of ByteDance DeerFlow is susceptible to this attack. The severity is compounded by the ease of exploitation, requiring only low-privileged access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade to a version of ByteDance DeerFlow that includes commit 2176b2b to remediate the vulnerability referenced by CVE-2026-40518.</li>
<li>Implement the Sigma rule <code>Detect Suspicious DeerFlow Agent Creation</code> to detect exploitation attempts targeting CVE-2026-40518 by monitoring process creation events.</li>
<li>Monitor web server logs for unusual activity related to custom agent creation endpoints in DeerFlow to detect potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>file-write</category><category>bytedance</category><category>deerflow</category></item><item><title>Unauthenticated Arbitrary File Write in Saltcorn</title><link>https://feed.craftedsignal.io/briefs/2026-04-saltcorn-file-write/</link><pubDate>Sat, 11 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-saltcorn-file-write/</guid><description>Unauthenticated attackers can exploit a vulnerability in Saltcorn versions prior to 1.4.5, 1.5.5, and 1.6.0-beta.4 to write arbitrary files and list directory contents on the server.</description><content:encoded><![CDATA[<p>Saltcorn, a no-code database application builder, is vulnerable to an unauthenticated arbitrary file write vulnerability. Specifically, versions prior to 1.4.5, 1.5.5, and 1.6.0-beta.4 are affected. An attacker can leverage the POST <code>/sync/offline_changes</code> endpoint to create arbitrary directories and write a <code>changes.json</code> file with attacker-controlled content anywhere on the server&rsquo;s filesystem. Subsequently, the GET <code>/sync/upload_finished</code> endpoint allows an unauthenticated attacker to list directory contents and read specific JSON files. This combination of actions allows for complete control of the application, potentially leading to remote code execution. This vulnerability is resolved in Saltcorn versions 1.4.5, 1.5.5, and 1.6.0-beta.4.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a POST request to the <code>/sync/offline_changes</code> endpoint.</li>
<li>This POST request includes crafted JSON content intended to be written to a <code>changes.json</code> file.</li>
<li>The server creates arbitrary directories based on the attacker&rsquo;s specifications within the POST request.</li>
<li>The server writes the attacker-supplied JSON content to the <code>changes.json</code> file in the created directory.</li>
<li>The attacker sends a GET request to the <code>/sync/upload_finished</code> endpoint.</li>
<li>The GET request specifies the directory the attacker previously created.</li>
<li>The server lists the contents of the specified directory, including the <code>changes.json</code> file.</li>
<li>The attacker reads the contents of the <code>changes.json</code> file. Successful exploitation allows arbitrary file creation, directory listing, and reading of file contents.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an unauthenticated attacker to write arbitrary files and list directory contents on the Saltcorn server. This can lead to complete compromise of the application, including remote code execution, data theft, and denial of service. Given that Saltcorn is used in various sectors to build database applications, the potential impact is significant across multiple industries.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Saltcorn to version 1.4.5, 1.5.5, or 1.6.0-beta.4 or later to patch CVE-2026-40163.</li>
<li>Deploy the Sigma rule <code>Detect Saltcorn Offline Changes Endpoint Abuse</code> to detect suspicious POST requests to the <code>/sync/offline_changes</code> endpoint.</li>
<li>Deploy the Sigma rule <code>Detect Saltcorn Upload Finished Endpoint Abuse</code> to detect suspicious GET requests to the <code>/sync/upload_finished</code> endpoint.</li>
<li>Monitor web server logs for unexpected POST requests to <code>/sync/offline_changes</code> and GET requests to <code>/sync/upload_finished</code> (webserver log source).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>saltcorn</category><category>file-write</category><category>vulnerability</category></item><item><title>BugSink Authenticated File Write Vulnerability (CVE-2026-40162)</title><link>https://feed.craftedsignal.io/briefs/2026-04-bugsink-file-write/</link><pubDate>Sat, 11 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-bugsink-file-write/</guid><description>BugSink 2.1.0 is vulnerable to an authenticated file write vulnerability (CVE-2026-40162) allowing an attacker with a valid authentication token to write arbitrary content to the filesystem, potentially leading to code execution or data compromise.</description><content:encoded><![CDATA[<p>BugSink, a self-hosted error tracking tool, is susceptible to an authenticated file write vulnerability in version 2.1.0. This vulnerability, identified as CVE-2026-40162, allows an attacker with a valid authentication token to write attacker-controlled content to a filesystem location writable by the BugSink process. The flaw resides in the artifact bundle assembly flow. Successful exploitation could allow an attacker to achieve arbitrary code execution on the BugSink server or compromise sensitive data. Organizations using BugSink 2.1.0 are vulnerable and should upgrade to version 2.1.1 to remediate the issue. This poses a risk to the confidentiality, integrity, and availability of the BugSink server and the data it manages.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker obtains valid authentication token for BugSink 2.1.0 through legitimate means (e.g., compromised user credentials) or by exploiting another vulnerability.</li>
<li>Attacker crafts a malicious artifact bundle containing attacker-controlled content.</li>
<li>Attacker sends a request to the BugSink server to assemble an artifact bundle, including the malicious content, using the valid authentication token.</li>
<li>BugSink server, running version 2.1.0, processes the request without proper validation of the artifact bundle contents.</li>
<li>The server writes the attacker-controlled content to a filesystem location writable by the BugSink process. This could overwrite existing files or create new ones.</li>
<li>If the attacker overwrites critical configuration files or injects malicious code into executable files, they may achieve code execution.</li>
<li>Attacker establishes a reverse shell or uses other methods to gain remote access to the BugSink server.</li>
<li>Attacker performs further actions such as data exfiltration, lateral movement, or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability could allow an attacker to achieve arbitrary code execution on the BugSink server, potentially leading to complete system compromise. Attackers could exfiltrate sensitive data, modify existing data, or use the compromised server to launch attacks against other systems. The vulnerability affects any BugSink 2.1.0 installation with a user who has a valid authentication token, and it requires a upgrade to version 2.1.1 to remediate.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade BugSink to version 2.1.1 immediately to patch CVE-2026-40162, as per the vendor&rsquo;s advisory.</li>
<li>Monitor web server logs for unusual POST requests to the artifact bundle assembly endpoints, which may indicate exploitation attempts. Deploy the Sigma rule <code>Detect Suspicious BugSink File Write</code> to your SIEM.</li>
<li>Implement strict input validation and sanitization for all user-supplied data processed by BugSink, to prevent similar file write vulnerabilities in the future.</li>
<li>Review and enforce least privilege access controls on the BugSink server, limiting the write access of the BugSink process to only the necessary files and directories.</li>
<li>Monitor file system events for unexpected file creations or modifications within the BugSink installation directory.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-40162</category><category>file-write</category><category>authentication</category></item><item><title>prompts.chat Path Traversal Vulnerability (CVE-2026-22661)</title><link>https://feed.craftedsignal.io/briefs/2026-04-prompts-chat-traversal/</link><pubDate>Sat, 04 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-prompts-chat-traversal/</guid><description>A path traversal vulnerability exists in prompts.chat prior to commit 0f8d4c3, allowing attackers to write arbitrary files to the client system by crafting malicious ZIP archives with unsanitized filenames.</description><content:encoded><![CDATA[<p>prompts.chat, a software application, is vulnerable to a path traversal attack (CVE-2026-22661) in versions prior to commit 0f8d4c3. This vulnerability stems from insufficient server-side validation of filenames within skill file archives. A remote attacker can exploit this by crafting malicious ZIP archives that contain filenames with path traversal sequences (e.g., ../). When a vulnerable prompts.chat instance extracts these archives, the lack of proper sanitization allows the attacker to write files to arbitrary locations on the file system, potentially overwriting critical system files and achieving arbitrary code execution. This poses a significant risk to system integrity and confidentiality.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious ZIP archive containing a specially crafted skill file.</li>
<li>The filenames within the ZIP archive include path traversal sequences such as <code>../</code>.</li>
<li>The attacker uploads the malicious ZIP archive to the prompts.chat application.</li>
<li>prompts.chat processes the uploaded ZIP archive without properly sanitizing the filenames.</li>
<li>The application extracts the contents of the ZIP archive, writing files to locations specified in the malicious filenames.</li>
<li>Path traversal sequences in the filenames allow the attacker to write files outside the intended extraction directory.</li>
<li>The attacker overwrites shell initialization files (e.g., <code>.bashrc</code>, <code>.profile</code>, <code>.bash_profile</code>) or other executable files.</li>
<li>When a user logs in or a new shell is spawned, the overwritten initialization file executes malicious code, granting the attacker arbitrary code execution on the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-22661 allows an attacker to write arbitrary files to the client system, leading to potential overwrite of sensitive system files and arbitrary code execution. The vulnerability affects systems running vulnerable versions of prompts.chat. The impact includes complete compromise of the system, data theft, and further propagation of malicious activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch by upgrading to commit 0f8d4c3 or later to remediate CVE-2026-22661.</li>
<li>Implement server-side filename validation and sanitization to prevent path traversal attacks when handling ZIP archives within prompts.chat.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect potential exploitation attempts.</li>
<li>Monitor web server logs for suspicious requests containing path traversal sequences in filenames as identified by the provided rules.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>file-write</category><category>code-execution</category><category>cve-2026-22661</category><category>prompts.chat</category><category>linux</category></item><item><title>@mobilenext/mobile-mcp Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-04-mobile-mcp-path-traversal/</link><pubDate>Fri, 27 Mar 2026 19:13:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-04-mobile-mcp-path-traversal/</guid><description>The @mobilenext/mobile-mcp package before version 0.0.49 is vulnerable to a Path Traversal vulnerability in the mobile_save_screenshot and mobile_start_screen_recording tools where the `saveTo` and `output` parameters are passed directly to filesystem operations without validation, potentially allowing an attacker to write files outside the intended workspace, leading to privilege escalation and persistence by overwriting sensitive host files.</description><content:encoded><![CDATA[<p>The <code>@mobilenext/mobile-mcp</code> npm package, versions prior to 0.0.49, contains a critical path traversal vulnerability. This flaw stems from the <code>mobile_save_screenshot</code> and <code>mobile_start_screen_recording</code> tools which improperly handle user-supplied paths. Specifically, the <code>saveTo</code> parameter in <code>mobile_save_screenshot</code> and the <code>output</code> parameter in <code>mobile_start_screen_recording</code> are passed directly to filesystem write operations without adequate validation. This oversight enables a malicious actor to write arbitrary files to locations outside of the intended workspace. A successful exploit of this vulnerability allows for the potential overwriting of sensitive system files, enabling privilege escalation and persistence on the host system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains control over the <code>saveTo</code> or <code>output</code> parameter of the vulnerable functions. This could be achieved through a malicious application, supply chain attack, or other means of code injection.</li>
<li>The attacker crafts a path containing traversal sequences (e.g., <code>../</code>) designed to navigate outside of the intended save directory.</li>
<li>The attacker calls the <code>mobile_save_screenshot</code> or <code>mobile_start_screen_recording</code> tool with the manipulated path as the <code>saveTo</code> or <code>output</code> parameter, respectively.</li>
<li>The vulnerable function passes the attacker-controlled path to <code>fs.writeFileSync()</code> without validation.</li>
<li><code>fs.writeFileSync()</code> writes the screenshot or screen recording data to the attacker-specified path.</li>
<li>If the path leads to a sensitive system file (e.g., <code>~/.bashrc</code>, <code>~/.ssh/authorized_keys</code>), it is overwritten with the contents of the screenshot or screen recording.</li>
<li>The attacker can overwrite configuration files or executables in order to achieve code execution.</li>
<li>The attacker achieves persistence and/or elevated privileges on the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this path traversal vulnerability can have severe consequences. An attacker can overwrite critical system files, such as shell configuration files (<code>.bashrc</code>, <code>.zshrc</code>), SSH authorized keys (<code>.ssh/authorized_keys</code>), or application configuration files. This can lead to arbitrary code execution, privilege escalation, and persistent backdoor access to the affected system. The reported impact includes potential for a broken shell and unauthorized access. All users of <code>@mobilenext/mobile-mcp</code> versions prior to 0.0.49 are vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to <code>@mobilenext/mobile-mcp</code> version 0.0.49 or later to remediate the vulnerability.</li>
<li>Implement robust input validation for all file paths used in file system operations. Specifically, validate the <code>saveTo</code> and <code>output</code> parameters of the <code>mobile_save_screenshot</code> and <code>mobile_start_screen_recording</code> functions.</li>
<li>Deploy the Sigma rule &ldquo;Detect Mobile-MCP Path Traversal Attempts&rdquo; to your SIEM to detect attempts to exploit this vulnerability.</li>
<li>Monitor application logs for unusual file access patterns or attempts to write to sensitive system directories.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>file-write</category><category>privilege-escalation</category><category>persistence</category></item></channel></rss>