<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Path-Traversal — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/path-traversal/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 17:39:31 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/path-traversal/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenMRS Module Upload Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-openmrs-zip-slip/</link><pubDate>Mon, 04 May 2026 17:39:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-openmrs-zip-slip/</guid><description>OpenMRS versions 2.7.8 and earlier, as well as versions 2.8.0 through 2.8.5, are vulnerable to a path traversal (Zip Slip) attack via the `POST /openmrs/ws/rest/v1/module` endpoint that allows authenticated attackers to achieve arbitrary file write and remote code execution.</description><content:encoded><![CDATA[<p>OpenMRS, an open-source enterprise electronic medical record system platform, is vulnerable to a path traversal (Zip Slip) vulnerability in its module upload functionality. Discovered in versions 2.7.8 and earlier, as well as versions 2.8.0 through 2.8.5, the vulnerability resides in the <code>POST /openmrs/ws/rest/v1/module</code> endpoint. An authenticated attacker with administrative privileges can exploit this flaw by uploading a specially crafted <code>.omod</code> archive containing malicious ZIP entries with directory traversal sequences. This can allow the attacker to write files outside of the intended module directory, potentially leading to arbitrary file write and remote code execution on the server. The vulnerability stems from incomplete path validation within the <code>WebModuleUtil.startModule()</code> function, an oversight compared to other extraction methods within the same codebase that are properly protected.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker authenticates to the OpenMRS instance with valid admin credentials via Basic Auth.</li>
<li>The attacker crafts a malicious <code>.omod</code> file containing a ZIP entry with a path traversal payload, such as <code>web/module/../../../../&lt;target_filename&gt;.jsp</code>.</li>
<li>The attacker sends a <code>POST</code> request to the <code>/openmrs/ws/rest/v1/module</code> endpoint, uploading the malicious <code>.omod</code> file.</li>
<li>The server receives the request and parses the uploaded <code>.omod</code> file, treating it as a ZIP archive.</li>
<li>During module loading via <code>WebModuleUtil.startModule()</code>, the server extracts entries under the <code>web/module/</code> directory.</li>
<li>Due to an incomplete check, the entry <code>web/module/../../../../&lt;target_filename&gt;.jsp</code> passes the initial validation.</li>
<li>The server attempts to write the extracted file to a path constructed by concatenating the traversed path, resulting in writing the file outside the intended <code>WEB-INF/view/module/</code> directory.</li>
<li>If the written file is a JSP script, accessing it via a browser triggers server-side execution, achieving Remote Code Execution (RCE).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to write arbitrary files within the web application root directory of the OpenMRS instance. This can lead to remote code execution, allowing the attacker to gain complete control of the affected server. Given OpenMRS&rsquo;s use in healthcare environments, a successful attack could compromise sensitive patient data, disrupt medical operations, and damage the reputation of the affected organization. The number of potentially affected installations is unknown, but the vulnerability impacts a widely used version of the platform.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade to a version of OpenMRS that includes the fix for CVE-2026-40076 to address the path traversal vulnerability.</li>
<li>Deploy the Sigma rule <code>Detect OpenMRS Malicious Module Upload</code> to identify exploitation attempts based on HTTP requests to the <code>/openmrs/ws/rest/v1/module</code> endpoint with suspicious file extensions in the query parameters.</li>
<li>Enable webserver logging to capture HTTP request data and facilitate detection and investigation efforts.</li>
<li>Monitor file creation events within the web application root directory for suspicious JSP files. Use the Sigma rule <code>Detect JSP File Creation in Web Application Root</code> as a starting point.</li>
<li>Enforce the <code>module.allow_web_admin</code> restriction consistently across all module upload entry points, including the REST API to prevent bypass.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>path-traversal</category><category>zip-slip</category><category>rce</category><category>openmrs</category><category>web-application</category></item><item><title>Flux159 mcp-game-asset-gen Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-mcp-game-asset-gen-path-traversal/</link><pubDate>Fri, 01 May 2026 21:16:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-mcp-game-asset-gen-path-traversal/</guid><description>A path traversal vulnerability exists in Flux159 mcp-game-asset-gen version 0.1.0, where manipulation of the `statusFile` argument in the `image_to_3d_async` function allows for remote exploitation.</description><content:encoded><![CDATA[<p>A path traversal vulnerability, identified as CVE-2026-7594, has been discovered in Flux159 mcp-game-asset-gen version 0.1.0. The vulnerability resides within the <code>image_to_3d_async</code> function located in the <code>src/index.ts</code> file of the MCP Interface component. Successful exploitation allows a remote attacker to manipulate the <code>statusFile</code> argument, potentially leading to unauthorized file access and modification. Public exploits are available, increasing the risk of widespread exploitation. The project maintainers were notified via an issue report, but have not yet addressed the vulnerability. This lack of response, coupled with the existence of public exploits, elevates the urgency for defenders.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of mcp-game-asset-gen 0.1.0 running on a remote server.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>image_to_3d_async</code> function.</li>
<li>Within the request, the attacker manipulates the <code>statusFile</code> argument to include path traversal sequences (e.g., &ldquo;../&rdquo;).</li>
<li>The server-side application processes the request, using the attacker-controlled <code>statusFile</code> value to construct a file path.</li>
<li>Due to insufficient input validation, the path traversal sequences are not properly sanitized.</li>
<li>The application attempts to read or write to a file outside the intended directory, based on the manipulated path.</li>
<li>If successful, the attacker gains unauthorized access to sensitive files or overwrites critical system files.</li>
<li>The attacker leverages the file access to further compromise the system, potentially leading to code execution or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this path traversal vulnerability could allow attackers to read sensitive files, overwrite critical system files, or even achieve remote code execution on the affected server. This could lead to data breaches, system instability, or complete server compromise. Given the availability of public exploits, organizations using mcp-game-asset-gen 0.1.0 are at immediate risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply input validation and sanitization to the <code>statusFile</code> argument within the <code>image_to_3d_async</code> function to prevent path traversal, addressing CVE-2026-7594.</li>
<li>Monitor web server logs for suspicious requests containing path traversal sequences (e.g., &ldquo;../&rdquo;) in the <code>statusFile</code> parameter using the provided Sigma rule.</li>
<li>Implement the Sigma rule targeting process creation events related to the exploitation of CVE-2026-7594.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>vulnerability</category><category>web-application</category></item><item><title>Fujian Apex LiveBOS Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-livebos-path-traversal/</link><pubDate>Fri, 01 May 2026 01:16:38 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-livebos-path-traversal/</guid><description>A path traversal vulnerability exists in Fujian Apex LiveBOS version 2.0 and earlier, allowing remote attackers to read arbitrary files by manipulating the filename argument in the /feed/UploadImage.do endpoint.</description><content:encoded><![CDATA[<p>Fujian Apex LiveBOS, a live broadcasting system, is vulnerable to a path traversal attack. This vulnerability, identified as CVE-2026-7519, exists due to insufficient input validation on the filename parameter within the /feed/UploadImage.do endpoint. Versions up to and including 2.0 are affected. Publicly available exploits exist, increasing the risk of exploitation. An attacker can leverage this flaw to access sensitive files on the server, potentially leading to information disclosure or further system compromise. Upgrading to version 2.1 or applying available patches is strongly recommended.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a Fujian Apex LiveBOS instance running version 2.0 or earlier.</li>
<li>The attacker crafts a malicious HTTP request targeting the /feed/UploadImage.do endpoint.</li>
<li>The attacker manipulates the filename parameter within the request, injecting path traversal sequences (e.g., ../../).</li>
<li>The server-side application fails to properly sanitize the filename, allowing the path traversal sequence to be processed.</li>
<li>The application attempts to read a file based on the attacker-controlled path.</li>
<li>If successful, the contents of the targeted file are returned to the attacker in the HTTP response.</li>
<li>The attacker analyzes the leaked file content for sensitive information (e.g., credentials, configuration files).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files on the LiveBOS server. This could include configuration files containing database credentials, private keys, or other confidential information. The impact ranges from information disclosure to potential full system compromise, depending on the accessed data. There are no reported victims or sectors targeted as of yet, but the public availability of the exploit increases the likelihood of exploitation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Fujian Apex LiveBOS to version 2.1 to remediate CVE-2026-7519.</li>
<li>Deploy the Sigma rule <code>Detect LiveBOS Path Traversal Attempt</code> to identify malicious requests exploiting the vulnerability.</li>
<li>Monitor web server logs for requests containing path traversal sequences targeting the <code>/feed/UploadImage.do</code> endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>web-application</category><category>cve-2026-7519</category></item><item><title>ABB PCM600 Path Traversal Vulnerability (CVE-2018-1002208)</title><link>https://feed.craftedsignal.io/briefs/2026-04-abb-pcm600-path-traversal/</link><pubDate>Thu, 30 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-abb-pcm600-path-traversal/</guid><description>A path traversal vulnerability in ABB PCM600 versions 1.5 to 2.13 (CVE-2018-1002208) allows a local attacker with low privileges to execute arbitrary code by sending a specially crafted message to the system node.</description><content:encoded><![CDATA[<p>ABB PCM600 versions 1.5 through 2.13 are vulnerable to a path traversal flaw (CVE-2018-1002208) within the SharpZip.dll library. Successful exploitation enables a local attacker with low privileges to execute arbitrary code on the affected system. This vulnerability resides in the software used to configure and manage protection and control IEDs (Intelligent Electronic Devices) in critical infrastructure sectors, specifically critical manufacturing. ABB recommends updating to PCM600 version 2.14 to remediate this vulnerability. The vulnerability was reported to CISA by ABB PSIRT.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains low-privilege access to the target system running a vulnerable ABB PCM600 version.</li>
<li>The attacker crafts a malicious message containing a path traversal payload designed to exploit CVE-2018-1002208.</li>
<li>The attacker sends the crafted message to the system node, targeting the vulnerable SharpZip.dll.</li>
<li>The SharpZip.dll processes the message without properly sanitizing the provided path.</li>
<li>The path traversal vulnerability allows the attacker to write arbitrary files to locations outside the intended directory.</li>
<li>The attacker leverages the file write capability to place a malicious executable or library in a trusted location.</li>
<li>The attacker triggers the execution of the malicious code, achieving arbitrary code execution on the system.</li>
<li>The attacker can then perform actions such as escalating privileges, installing malware, or disrupting industrial processes.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2018-1002208 can lead to arbitrary code execution on systems running vulnerable ABB PCM600 versions within critical manufacturing environments. While no specific victim counts or sectors are detailed in the advisory, the vulnerability&rsquo;s presence in industrial control systems poses a significant risk. A successful attack could disrupt manufacturing processes, cause equipment damage, or lead to data breaches.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to ABB Protection and control IED manager PCM600 version 2.14 to address CVE-2018-1002208 as per the vendor&rsquo;s recommendation.</li>
<li>If using RE_630 protection relays with older PCM600 versions, implement system-level defenses as described in ABB&rsquo;s security advisory 2NGA002813.</li>
<li>Minimize network exposure for all control system devices and systems, ensuring they are not accessible from the internet, as recommended by CISA.</li>
<li>Monitor file creation events for suspicious file paths that may indicate path traversal attempts exploiting CVE-2018-1002208, using a rule similar to the example provided.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>ics</category><category>path traversal</category><category>industrial control system</category></item><item><title>OpenPrinting CUPS Path Traversal Vulnerability (CVE-2026-34978)</title><link>https://feed.craftedsignal.io/briefs/2026-05-cups-path-traversal/</link><pubDate>Thu, 30 Apr 2026 08:46:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cups-path-traversal/</guid><description>CVE-2026-34978 is a path traversal vulnerability in OpenPrinting CUPS that allows writing files outside the CacheDir/rss directory, potentially overwriting the job.cache file.</description><content:encoded><![CDATA[<p>CVE-2026-34978 is a path traversal vulnerability affecting OpenPrinting CUPS, a modular printing system that allows a computer to act as a print server. The vulnerability exists within the RSS notify-recipient-uri functionality, which improperly validates file paths. By crafting a malicious URI, an attacker can write files outside the intended CacheDir/rss directory. This can lead to the overwriting of critical system files, such as job.cache, potentially disrupting print services and, in some scenarios, leading to arbitrary code execution. This vulnerability was disclosed by Microsoft and requires immediate attention from system administrators to prevent potential exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious RSS notify-recipient-uri containing a path traversal sequence (e.g., &ldquo;../&rdquo;).</li>
<li>The crafted URI is submitted to the CUPS server through a print job request or a configuration setting.</li>
<li>CUPS processes the URI and attempts to write a file to the specified location.</li>
<li>Due to the path traversal vulnerability, the file is written outside the intended CacheDir/rss directory.</li>
<li>The attacker overwrites a critical file, such as job.cache, with malicious content.</li>
<li>The CUPS server attempts to access the overwritten file.</li>
<li>If job.cache is successfully overwritten, the attacker can gain control of the print queue or cause a denial of service by corrupting the print system&rsquo;s state.</li>
<li>In a more advanced scenario, the attacker could potentially achieve arbitrary code execution by overwriting other binaries or configuration files.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-34978 can lead to denial of service by corrupting the printing system state. By overwriting critical CUPS files, an attacker can disrupt printing services. In more critical scenarios, the vulnerability could be leveraged to achieve arbitrary code execution, potentially allowing the attacker to gain complete control over the affected system. The scope of the impact is dependent on the permissions of the CUPS process and the specific files that are overwritten.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security patch provided by OpenPrinting to address CVE-2026-34978.</li>
<li>Monitor CUPS server logs for suspicious activity related to file writes outside the CacheDir/rss directory. Consider deploying the provided Sigma rule <code>Detect CUPS Path Traversal File Write</code> to identify such attempts.</li>
<li>Implement strict input validation on any user-supplied data that is used to construct file paths within CUPS.</li>
<li>Regularly review and audit CUPS configuration settings to ensure that they are secure and do not allow for path traversal vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path traversal</category><category>cups</category><category>cve-2026-34978</category><category>file write</category></item><item><title>Relative Path Traversal Vulnerability in mcpo-simple-server</title><link>https://feed.craftedsignal.io/briefs/2026-04-mcpo-simple-server-traversal/</link><pubDate>Wed, 29 Apr 2026 21:16:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-mcpo-simple-server-traversal/</guid><description>A relative path traversal vulnerability exists in getsimpletool mcpo-simple-server &lt;= 0.2.0, allowing remote attackers to delete arbitrary files via manipulation of the `detail` argument in the `delete_shared_prompt` function.</description><content:encoded><![CDATA[<p>A relative path traversal vulnerability, identified as CVE-2026-7404, has been discovered in getsimpletool mcpo-simple-server up to version 0.2.0. The vulnerability resides within the <code>delete_shared_prompt</code> function of the <code>src/mcpo_simple_server/services/prompt_manager/base_manager.py</code> file. By manipulating the <code>detail</code> argument, a remote attacker can traverse the file system and delete arbitrary files. The vulnerability is remotely exploitable, and proof-of-concept exploit code is publicly available. The maintainers of the getsimpletool project have been notified of this vulnerability but have not yet responded. This poses a significant risk to systems running mcpo-simple-server, as it could lead to unauthorized file deletion and potential system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable mcpo-simple-server instance running version 0.2.0 or earlier.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>delete_shared_prompt</code> function.</li>
<li>The malicious request includes a manipulated <code>detail</code> argument containing relative path traversal sequences (e.g., <code>../</code>).</li>
<li>The server-side application processes the request and passes the manipulated <code>detail</code> argument to the <code>delete_shared_prompt</code> function.</li>
<li>The <code>delete_shared_prompt</code> function uses the attacker-controlled <code>detail</code> argument to construct a file path.</li>
<li>Due to the path traversal sequences, the resulting file path points to a location outside the intended directory.</li>
<li>The application attempts to delete the file at the attacker-specified location.</li>
<li>If permissions allow, the file is successfully deleted, leading to potential data loss or system instability.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to delete arbitrary files on the affected system. This can lead to data loss, application malfunction, or even complete system compromise, depending on the files targeted for deletion. Given the public availability of exploit code, systems running vulnerable versions of mcpo-simple-server are at immediate risk. The impact is especially severe if the targeted files are critical system files or application data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade mcpo-simple-server to a patched version that addresses CVE-2026-7404, if available from the vendor.</li>
<li>Deploy the Sigma rule <code>Detect Mcpo-Simple-Server Path Traversal Attempt</code> to identify exploitation attempts in web server logs.</li>
<li>Implement strict input validation and sanitization on the <code>detail</code> argument of the <code>delete_shared_prompt</code> function, if patching is not immediately feasible.</li>
<li>Monitor web server logs for suspicious activity, such as requests containing path traversal sequences.</li>
<li>Restrict file system permissions to limit the impact of successful path traversal attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>web-application</category><category>cve-2026-7404</category></item><item><title>Path Traversal Vulnerability in mail-mcp-bridge</title><link>https://feed.craftedsignal.io/briefs/2026-04-mail-mcp-bridge-path-traversal/</link><pubDate>Wed, 29 Apr 2026 16:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-mail-mcp-bridge-path-traversal/</guid><description>A path traversal vulnerability exists in fatbobman mail-mcp-bridge version 1.3.3 and earlier, allowing a remote attacker to read arbitrary files by manipulating the message_ids argument in the src/mail_mcp_server.py file.</description><content:encoded><![CDATA[<p>A path traversal vulnerability, identified as CVE-2026-7386, has been discovered in fatbobman mail-mcp-bridge version 1.3.3 and prior. The vulnerability resides within the <code>src/mail_mcp_server.py</code> file, specifically affecting an unspecified function that handles the <code>message_ids</code> argument. A remote attacker can exploit this flaw by crafting malicious requests containing manipulated <code>message_ids</code> values. Successful exploitation allows the attacker to traverse the file system and potentially read sensitive files. An exploit is publicly available. The vulnerability is addressed in version 1.3.4, with patch <code>638b162b26532e32fa8d8047f638537dbdfe197a</code>.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of mail-mcp-bridge running version 1.3.3 or earlier.</li>
<li>The attacker crafts a malicious HTTP request targeting the endpoint that processes <code>message_ids</code>.</li>
<li>Within the request, the attacker includes a <code>message_ids</code> parameter containing path traversal sequences (e.g., <code>../</code>).</li>
<li>The server-side application, without proper validation, processes the manipulated <code>message_ids</code> value.</li>
<li>The application attempts to access a file path constructed using the attacker-controlled input.</li>
<li>Due to the path traversal sequences, the application accesses a file outside the intended directory.</li>
<li>The application reads the contents of the traversed file.</li>
<li>The attacker retrieves the contents of the file, gaining access to sensitive information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to read arbitrary files on the server. This could lead to the exposure of sensitive data such as configuration files, application source code, or user data. With a CVSS v3.1 base score of 7.3, this vulnerability poses a significant risk. The number of affected installations is unknown, but any instance of mail-mcp-bridge running a vulnerable version is susceptible to attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade fatbobman mail-mcp-bridge to version 1.3.4 or later to apply the patch <code>638b162b26532e32fa8d8047f638537dbdfe197a</code> that resolves CVE-2026-7386.</li>
<li>Deploy the Sigma rule &ldquo;Detect mail-mcp-bridge Path Traversal Attempt&rdquo; to identify exploitation attempts in web server logs.</li>
<li>Implement input validation on the <code>message_ids</code> parameter to prevent path traversal attacks in web applications, even after patching.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>vulnerability</category><category>web-application</category></item><item><title>Eiceblue Spire-PDF-MCP-Server Path Traversal Vulnerability (CVE-2026-7315)</title><link>https://feed.craftedsignal.io/briefs/2026-04-spire-pdf-path-traversal/</link><pubDate>Wed, 29 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-spire-pdf-path-traversal/</guid><description>A path traversal vulnerability exists in eiceblue spire-pdf-mcp-server version 0.1.1, allowing remote attackers to access arbitrary files via manipulation of the filepath argument in the get_pdf_path function.</description><content:encoded><![CDATA[<p>A path traversal vulnerability, identified as CVE-2026-7315, affects eiceblue spire-pdf-mcp-server version 0.1.1. The vulnerability resides in the <code>get_pdf_path</code> function within the <code>src/spire_pdf_mcp/server.py</code> file. By manipulating the <code>filepath</code> argument, a remote attacker can bypass directory traversal restrictions and potentially access sensitive files on the server. Public exploits are available, increasing the risk of exploitation. The vendor has been notified but has not yet provided a patch or response. This vulnerability poses a significant risk to systems running the affected software.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of eiceblue spire-pdf-mcp-server 0.1.1 exposed to the network.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>get_pdf_path</code> function, embedding a path traversal sequence (e.g., <code>../</code>) within the <code>filepath</code> parameter.</li>
<li>The server receives the request and processes the <code>filepath</code> argument without proper sanitization or validation.</li>
<li>The <code>get_pdf_path</code> function constructs a file path using the attacker-controlled input, allowing the traversal of directories outside the intended PDF file storage location.</li>
<li>The server attempts to access a file outside the intended directory, based on the manipulated path.</li>
<li>If successful, the server reads the contents of the arbitrary file.</li>
<li>The server returns the contents of the file to the attacker.</li>
<li>The attacker gains unauthorized access to sensitive information, potentially including configuration files, credentials, or other confidential data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7315 allows a remote attacker to read arbitrary files on the server. This can lead to the disclosure of sensitive information, such as configuration files, credentials, or internal application code. The impact could include complete compromise of the affected system and potential lateral movement within the network. Given the availability of public exploits, the risk of widespread exploitation is elevated.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Spire-PDF Path Traversal Attempt</code> to identify malicious requests containing path traversal sequences.</li>
<li>Monitor web server logs for HTTP requests targeting the <code>get_pdf_path</code> function with suspicious <code>filepath</code> parameters (e.g., containing &ldquo;../&rdquo;).</li>
<li>Implement strict input validation and sanitization measures for the <code>filepath</code> argument in the <code>get_pdf_path</code> function to prevent path traversal attacks.</li>
<li>Apply any available patches or updates from the vendor as soon as they are released to address CVE-2026-7315.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>web-application</category><category>cve</category></item><item><title>eiceblue spire-doc-mcp-server Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-spire-doc-mcp-server-path-traversal/</link><pubDate>Wed, 29 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-spire-doc-mcp-server-path-traversal/</guid><description>A path traversal vulnerability exists in eiceblue spire-doc-mcp-server version 1.0.0, allowing a remote attacker to access arbitrary files by manipulating the 'document_name' argument in the 'get_doc_path' function.</description><content:encoded><![CDATA[<p>A critical path traversal vulnerability has been identified in eiceblue spire-doc-mcp-server version 1.0.0. The vulnerability resides within the <code>get_doc_path</code> function of the <code>src/spire_doc_mcp/api/base.py</code> file. By manipulating the <code>document_name</code> argument, an attacker can bypass intended directory restrictions and access files outside the designated document path. This attack can be initiated remotely without authentication, posing a significant risk. Public exploits are available, increasing the likelihood of exploitation. The vendor was notified through an issue report, but has not yet responded.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a crafted HTTP request to the spire-doc-mcp-server.</li>
<li>The request targets an endpoint that utilizes the vulnerable <code>get_doc_path</code> function.</li>
<li>The attacker manipulates the <code>document_name</code> parameter within the request.</li>
<li>The <code>document_name</code> parameter contains a path traversal sequence (e.g., &ldquo;../&rdquo;) designed to escape the intended directory.</li>
<li>The <code>get_doc_path</code> function fails to properly sanitize or validate the <code>document_name</code> input.</li>
<li>The application constructs a file path based on the malicious input.</li>
<li>The application attempts to read the file at the attacker-controlled path.</li>
<li>The attacker successfully retrieves the contents of an arbitrary file on the server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this path traversal vulnerability allows an attacker to read sensitive files on the server. This could include configuration files containing credentials, source code, or other confidential data. The CVSS v3.1 score of 7.3 reflects the high severity of this issue. The lack of vendor response and availability of public exploits significantly increases the risk to organizations using vulnerable versions of spire-doc-mcp-server.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Spire-doc-mcp-server Path Traversal Attempt</code> to your SIEM to detect exploitation attempts by monitoring web server logs for path traversal sequences.</li>
<li>Apply input validation and sanitization to the <code>document_name</code> argument in the <code>get_doc_path</code> function within <code>src/spire_doc_mcp/api/base.py</code> to prevent path traversal.</li>
<li>Monitor web server logs for HTTP requests containing path traversal sequences (e.g., &ldquo;..%2F&rdquo;, &ldquo;../&rdquo;) targeting endpoints related to document retrieval.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>web-application</category><category>cve-2026-7314</category></item><item><title>Elinsky execution-system-mcp Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-elinsky-path-traversal/</link><pubDate>Wed, 29 Apr 2026 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-elinsky-path-traversal/</guid><description>Elinsky execution-system-mcp 0.1.0 is vulnerable to path traversal via manipulation of the context argument in the _get_context_file_path function, allowing remote attackers to access sensitive files.</description><content:encoded><![CDATA[<p>A path traversal vulnerability, identified as CVE-2026-7319, affects elinsky execution-system-mcp version 0.1.0. The vulnerability resides in the <code>_get_context_file_path</code> function located within the <code>src/execution_system_mcp/server.py</code> file, which is part of the <code>add_action</code> Tool component. By manipulating the <code>context</code> argument, a remote attacker can bypass directory restrictions and access unauthorized files. The existence of a published exploit increases the risk of this vulnerability being actively exploited. Defenders should prioritize patching and implementing mitigations to prevent potential data breaches or system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of elinsky execution-system-mcp 0.1.0 running remotely.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>add_action</code> tool.</li>
<li>Within the HTTP request, the attacker injects a path traversal sequence (e.g., <code>../</code>) into the <code>context</code> argument of the <code>_get_context_file_path</code> function.</li>
<li>The <code>_get_context_file_path</code> function processes the tainted input without proper sanitization, allowing the path traversal sequence to resolve to a file outside of the intended directory.</li>
<li>The server attempts to read the file specified by the attacker-controlled path.</li>
<li>Sensitive information from the targeted file is read by the server.</li>
<li>The server returns the content of the file, or an error message indicating the file content, to the attacker.</li>
<li>The attacker obtains sensitive information, potentially leading to further exploitation, such as privilege escalation or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to read arbitrary files on the server. This could lead to the disclosure of sensitive information, such as configuration files, source code, or user data. The CVSS v3.1 score of 7.3 indicates a high severity, highlighting the potential for significant impact. The lack of specifics regarding victim count and sectors targeted in the source information makes it difficult to quantify the precise scale of potential damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates for elinsky execution-system-mcp to address CVE-2026-7319.</li>
<li>Implement input validation and sanitization measures to prevent path traversal attacks within the <code>_get_context_file_path</code> function.</li>
<li>Deploy the Sigma rule provided to detect exploitation attempts by monitoring for suspicious path traversal sequences in HTTP requests to the <code>add_action</code> tool.</li>
<li>Monitor web server logs for requests containing path traversal sequences such as &ldquo;../&rdquo; and ensure proper logging of access attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>path-traversal</category><category>web-application</category><category>cve-2026-7319</category></item><item><title>mkdocs-mcp-plugin Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-mkdocs-path-traversal/</link><pubDate>Tue, 28 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-mkdocs-path-traversal/</guid><description>A path traversal vulnerability exists in douinc mkdocs-mcp-plugin up to version 0.4.1, allowing remote attackers to access unauthorized files through manipulation of the docs_dir/file_path argument in the read_document/list_documents functions within server.py.</description><content:encoded><![CDATA[<p>A path traversal vulnerability, identified as CVE-2026-7159, has been discovered in douinc&rsquo;s mkdocs-mcp-plugin, affecting versions up to 0.4.1. The flaw resides within the <code>read_document</code> and <code>list_documents</code> functions of the <code>server.py</code> file. By manipulating the <code>docs_dir</code> or <code>file_path</code> arguments, a remote attacker can bypass intended access restrictions and potentially read sensitive files on the server. A public exploit is available, increasing the risk of exploitation. The vendor has acknowledged the vulnerability and plans to release a fix in the coming days. This vulnerability poses a significant risk to systems using the affected plugin, potentially exposing sensitive data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a server running a vulnerable version (&lt;= 0.4.1) of the <code>mkdocs-mcp-plugin</code>.</li>
<li>Attacker crafts a malicious HTTP request targeting the <code>read_document</code> or <code>list_documents</code> endpoint.</li>
<li>The crafted request includes a manipulated <code>docs_dir</code> or <code>file_path</code> parameter designed to traverse the file system. This commonly involves using sequences like <code>../</code> to move up directories.</li>
<li>The vulnerable <code>server.py</code> script fails to properly sanitize or validate the provided path.</li>
<li>The application attempts to read a file outside the intended document root, based on the attacker-controlled path.</li>
<li>If successful, the contents of the targeted file are returned in the HTTP response to the attacker.</li>
<li>The attacker can repeat this process to enumerate and access various sensitive files.</li>
<li>The attacker gains unauthorized access to sensitive information, potentially including configuration files, source code, or user data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this path traversal vulnerability (CVE-2026-7159) can lead to unauthorized access to sensitive files on the server. This could include configuration files, application source code, or user data. The impact ranges from information disclosure to potential compromise of the entire system, depending on the nature of the exposed data. Given the public availability of an exploit, affected systems are at increased risk of attack. The vendor is planning to release a fix soon.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch for mkdocs-mcp-plugin as soon as it is released by the vendor to remediate CVE-2026-7159.</li>
<li>Deploy the Sigma rule <code>Detect Mkdocs Path Traversal Attempt</code> to identify exploitation attempts in web server logs.</li>
<li>Monitor web server logs for suspicious URL patterns containing path traversal sequences like <code>../</code> targeting file access endpoints, as detailed in the Attack Chain.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>mkdocs</category><category>CVE-2026-7159</category></item><item><title>AgiFlow scaffold-mcp Path Traversal Vulnerability (CVE-2026-7237)</title><link>https://feed.craftedsignal.io/briefs/2024-01-agiflow-path-traversal/</link><pubDate>Tue, 28 Apr 2026 08:16:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-agiflow-path-traversal/</guid><description>A path traversal vulnerability (CVE-2026-7237) exists in AgiFlow scaffold-mcp versions up to 1.0.27, allowing remote attackers to write to arbitrary files by manipulating the file_path argument in the write-to-file tool.</description><content:encoded><![CDATA[<p>AgiFlow scaffold-mcp, a software component with unknown functionality, is vulnerable to a path traversal attack. This vulnerability, identified as CVE-2026-7237, affects versions up to 1.0.27. The vulnerability resides in the <code>packages/scaffold-mcp/src/server/index.ts</code> file, specifically within the &ldquo;write-to-file&rdquo; tool. An attacker can remotely exploit this flaw by manipulating the <code>file_path</code> argument, enabling them to write to arbitrary locations on the server. A patch has been released in version 1.1.0 with commit hash <code>c4d23592ae5fb59cfeefc4641e6826f8ac89b9c6</code> to address this vulnerability. The exploit is publicly available.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an AgiFlow scaffold-mcp instance running a vulnerable version (&lt;= 1.0.27).</li>
<li>The attacker crafts a malicious request targeting the &ldquo;write-to-file&rdquo; tool.</li>
<li>The request includes a manipulated <code>file_path</code> argument containing path traversal sequences (e.g., &ldquo;../&rdquo;, &ldquo;..\&rdquo;).</li>
<li>The server-side application processes the request without proper sanitization or validation of the <code>file_path</code> argument.</li>
<li>The application attempts to write data to the attacker-controlled file path.</li>
<li>Due to the path traversal sequences, the data is written to an arbitrary location on the server&rsquo;s file system.</li>
<li>The attacker may overwrite critical system files, inject malicious code, or exfiltrate sensitive data, depending on the write permissions and targeted file location.</li>
<li>Successful exploitation leads to arbitrary code execution, data compromise, or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7237 allows attackers to write arbitrary files to the affected system, potentially leading to code execution, data exfiltration, or denial of service. The number of affected installations is currently unknown. Due to the public availability of the exploit, organizations using AgiFlow scaffold-mcp are at immediate risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade AgiFlow scaffold-mcp to version 1.1.0 or later to remediate CVE-2026-7237, applying the patch identified by commit hash <code>c4d23592ae5fb59cfeefc4641e6826f8ac89b9c6</code>.</li>
<li>Implement input validation and sanitization on the <code>file_path</code> argument within the &ldquo;write-to-file&rdquo; tool to prevent path traversal attacks.</li>
<li>Deploy the Sigma rule &ldquo;Detect AgiFlow Scaffold-mcp Path Traversal Attempt&rdquo; to identify exploitation attempts in web server logs.</li>
<li>Monitor web server logs for suspicious requests containing path traversal sequences in the URI.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>cve</category><category>web-application</category></item><item><title>BrowserOperator Core Path Traversal Vulnerability (CVE-2026-7234)</title><link>https://feed.craftedsignal.io/briefs/2026-04-browseroperator-path-traversal/</link><pubDate>Tue, 28 Apr 2026 07:16:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-browseroperator-path-traversal/</guid><description>A path traversal vulnerability (CVE-2026-7234) exists in BrowserOperator browser-operator-core up to version 0.6.0, allowing remote attackers to read arbitrary files by manipulating the request.url argument in the startsWith function of scripts/component_server/server.js.</description><content:encoded><![CDATA[<p>A path traversal vulnerability has been identified in BrowserOperator browser-operator-core versions up to 0.6.0. The vulnerability, designated as CVE-2026-7234, resides in the <code>startsWith</code> function within the <code>scripts/component_server/server.js</code> file. By manipulating the <code>request.url</code> argument, an attacker can bypass path restrictions and potentially access sensitive files on the server. The vulnerability can be exploited remotely, and a proof-of-concept exploit is publicly available. The BrowserOperator project has been notified, but a patch has not yet been released. Successful exploitation could lead to information disclosure and unauthorized access to system resources.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable BrowserOperator browser-operator-core instance running a version prior to 0.6.0.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>component_server/server.js</code> endpoint.</li>
<li>The crafted request includes a manipulated <code>request.url</code> argument designed to bypass the <code>startsWith</code> function&rsquo;s intended path restrictions.</li>
<li>The <code>startsWith</code> function fails to properly sanitize or validate the <code>request.url</code> input.</li>
<li>The application uses the attacker-controlled <code>request.url</code> to construct a file path.</li>
<li>The application attempts to read a file based on the constructed path, traversing directories outside of the intended scope.</li>
<li>If successful, the contents of the targeted file are returned to the attacker in the HTTP response.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to read arbitrary files on the server hosting the BrowserOperator browser-operator-core application. This could lead to the disclosure of sensitive information, including configuration files, credentials, or source code. The lack of response from the project maintainers increases the risk of widespread exploitation, especially given the availability of a public exploit.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect webserver logs for HTTP requests containing path traversal patterns in the URL targeting the <code>component_server/server.js</code> endpoint to detect potential exploitation attempts. Deploy the Sigma rule <code>Detect BrowserOperator Path Traversal Attempt</code> to identify suspicious requests.</li>
<li>Monitor web server logs for unusual file access patterns originating from the BrowserOperator application.</li>
<li>Consider using a web application firewall (WAF) to filter out malicious requests targeting the vulnerable endpoint, mitigating the risk of CVE-2026-7234.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>web-application</category><category>cve-2026-7234</category></item><item><title>Path Traversal Vulnerability in engineer-your-data</title><link>https://feed.craftedsignal.io/briefs/2026-04-engineer-your-data-path-traversal/</link><pubDate>Tue, 28 Apr 2026 02:16:08 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-engineer-your-data-path-traversal/</guid><description>A path traversal vulnerability (CVE-2026-7214) exists in eghuzefa's engineer-your-data up to version 0.1.3, allowing remote attackers to read or write arbitrary files by manipulating the WORKSPACE_PATH argument.</description><content:encoded><![CDATA[<p>A path traversal vulnerability, identified as CVE-2026-7214, has been discovered in eghuzefa&rsquo;s engineer-your-data, specifically affecting versions up to 0.1.3. This flaw resides within the <code>read_file</code>, <code>write_file</code>, <code>list_files</code>, and <code>file_inf</code> functions of the <code>src/server.py</code> file. Successful exploitation allows a remote attacker to bypass directory restrictions and access or modify files outside the intended <code>WORKSPACE_PATH</code>. The vulnerability&rsquo;s ease of exploitation is increased by the public availability of exploit code. Although the project was notified through an issue report, no response or patch has been released to date. This poses a significant risk to systems running vulnerable versions of engineer-your-data, potentially leading to sensitive data exposure or unauthorized modifications.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of <code>engineer-your-data</code> running version 0.1.3 or earlier.</li>
<li>The attacker crafts a malicious request targeting the <code>read_file</code>, <code>write_file</code>, <code>list_files</code>, or <code>file_inf</code> endpoints.</li>
<li>The malicious request includes a manipulated <code>WORKSPACE_PATH</code> argument containing path traversal sequences (e.g., <code>../</code>).</li>
<li>The <code>src/server.py</code> script processes the request without proper sanitization or validation of the <code>WORKSPACE_PATH</code>.</li>
<li>The application attempts to access a file system resource based on the attacker-controlled path.</li>
<li>Due to the path traversal, the application accesses a file or directory outside the intended <code>WORKSPACE_PATH</code>.</li>
<li>If the <code>read_file</code> function is targeted, the attacker retrieves the contents of an arbitrary file.</li>
<li>If the <code>write_file</code> function is targeted, the attacker can overwrite an arbitrary file.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote, unauthenticated attacker to read sensitive files on the server, potentially exposing credentials, configuration files, or other confidential data. Alternatively, an attacker could overwrite system files, leading to denial of service or arbitrary code execution. Given the public availability of exploit code, vulnerable systems are at high risk of compromise. The impact is amplified by the lack of a patch or response from the project maintainers.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious requests containing path traversal sequences (e.g., &ldquo;../&rdquo;) in the <code>WORKSPACE_PATH</code> parameter, as described in the attack chain. Deploy the Sigma rule <code>Detect Engineer-Your-Data Path Traversal Attempt</code> to identify malicious requests.</li>
<li>Apply input validation and sanitization to the <code>WORKSPACE_PATH</code> argument in <code>src/server.py</code> to prevent path traversal, addressing CVE-2026-7214.</li>
<li>Consider using a web application firewall (WAF) to block requests containing path traversal sequences.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>vulnerability</category></item><item><title>edvardlindelof notes-mcp Path Traversal Vulnerability (CVE-2026-7212)</title><link>https://feed.craftedsignal.io/briefs/2026-04-notes-mcp-path-traversal/</link><pubDate>Tue, 28 Apr 2026 02:16:08 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-notes-mcp-path-traversal/</guid><description>A path traversal vulnerability exists in edvardlindelof notes-mcp up to version 0.1.4, affecting the notes_mcp.py file, allowing a remote attacker to access sensitive files by manipulating the `root_dir/path` argument.</description><content:encoded><![CDATA[<p>A path traversal vulnerability, identified as CVE-2026-7212, affects edvardlindelof notes-mcp version 0.1.4 and earlier. This flaw resides within the <code>notes_mcp.py</code> file, where manipulation of the <code>root_dir/path</code> argument allows unauthorized access to files and directories outside the intended scope. The vulnerability can be exploited remotely and a proof-of-concept exploit is publicly available, increasing the risk of widespread exploitation. The vendor was notified through an issue report but has not yet responded, making timely patching unlikely. Successful exploitation could lead to sensitive data exposure, potentially compromising the entire application and server.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an instance of <code>notes-mcp</code> running version 0.1.4 or earlier.</li>
<li>The attacker crafts a malicious HTTP request targeting the vulnerable endpoint in <code>notes_mcp.py</code>.</li>
<li>The crafted request includes a manipulated <code>root_dir/path</code> argument containing path traversal sequences (e.g., <code>../</code>) to navigate outside the intended directory.</li>
<li>The application fails to properly sanitize or validate the <code>root_dir/path</code> argument.</li>
<li>The application uses the attacker-controlled path to access files or directories on the server&rsquo;s file system.</li>
<li>The attacker retrieves sensitive data, such as configuration files, application source code, or user data, by reading arbitrary files on the server.</li>
<li>If write access is possible, the attacker may overwrite critical system files.</li>
<li>The attacker uses the exposed information to further compromise the system or gain unauthorized access to other resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this path traversal vulnerability can lead to unauthorized access to sensitive files and directories on the affected server. This could result in the disclosure of confidential data, such as user credentials, application source code, or internal configuration details. The vulnerability has a CVSS v3.1 score of 7.3 (HIGH), indicating a significant risk. The number of potential victims is unknown, but any system running the vulnerable version of <code>notes-mcp</code> is at risk. The project&rsquo;s lack of response to the vulnerability report suggests that a patch may not be immediately available, increasing the window of opportunity for attackers.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server access logs for suspicious requests containing path traversal sequences like <code>../</code> in the URI targeting <code>notes_mcp.py</code> to identify potential exploitation attempts (see Sigma rule <code>Detect notes-mcp Path Traversal Attempt</code>).</li>
<li>Deploy the provided Sigma rules to your SIEM to detect exploitation attempts targeting this vulnerability.</li>
<li>Monitor network traffic for unusual file access patterns originating from the affected server after potential exploitation.</li>
<li>Since a public exploit is available, prioritize patching or mitigating this vulnerability if you are using the affected software, paying close attention to changes in request patterns and ensuring awareness of CVE-2026-7212.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>web-application</category><category>CVE-2026-7212</category></item><item><title>Duartium papers-mcp-server Path Traversal Vulnerability (CVE-2026-7205)</title><link>https://feed.craftedsignal.io/briefs/2026-04-duartium-path-traversal/</link><pubDate>Tue, 28 Apr 2026 01:17:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-duartium-path-traversal/</guid><description>A path traversal vulnerability exists in the `search_papers` function of `src/main.py` in duartium papers-mcp-server version 9ceb3812a6458ba7922ca24a7406f8807bc55598, allowing remote attackers to read arbitrary files by manipulating the `topic` argument, with a public exploit available.</description><content:encoded><![CDATA[<p>A path traversal vulnerability has been identified in duartium papers-mcp-server, specifically version 9ceb3812a6458ba7922ca24a7406f8807bc55598. The vulnerability resides within the <code>search_papers</code> function located in the <code>src/main.py</code> file. By manipulating the <code>topic</code> argument, a remote attacker can exploit this flaw to traverse the file system and potentially read sensitive files. This vulnerability, identified as CVE-2026-7205, is remotely exploitable and has a publicly available exploit, increasing the risk of widespread exploitation. The project maintainers were notified, but there has been no response or patch released, making immediate defensive measures critical for organizations using this software.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of duartium papers-mcp-server version 9ceb3812a6458ba7922ca24a7406f8807bc55598.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>search_papers</code> function.</li>
<li>Within the HTTP request, the attacker injects a path traversal payload into the <code>topic</code> argument, such as &ldquo;../../etc/passwd&rdquo;.</li>
<li>The server-side application, without proper sanitization, processes the malicious <code>topic</code> argument.</li>
<li>The application attempts to read the file specified by the attacker&rsquo;s path traversal payload (e.g., /etc/passwd).</li>
<li>The server responds with the contents of the requested file, effectively leaking sensitive information to the attacker.</li>
<li>The attacker analyzes the leaked file for sensitive data, such as usernames, passwords, or configuration details.</li>
<li>The attacker uses the obtained information to further compromise the system or network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this path traversal vulnerability allows attackers to read arbitrary files on the affected server. This could lead to the disclosure of sensitive configuration files, user credentials, or source code, potentially leading to further compromise, lateral movement within the network, and data breaches. The lack of a patch and the availability of a public exploit increases the likelihood of widespread exploitation and potential damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule provided in this brief to detect exploitation attempts against the <code>search_papers</code> endpoint, focusing on path traversal payloads in the <code>topic</code> parameter.</li>
<li>Implement input validation and sanitization on the <code>topic</code> parameter within the <code>search_papers</code> function to prevent path traversal attacks.</li>
<li>Monitor web server logs for suspicious requests containing path traversal sequences like &ldquo;../&rdquo; and &ldquo;./&rdquo; in the URI query to detect potential exploitation attempts.</li>
<li>Apply rate limiting to the <code>search_papers</code> endpoint to mitigate potential brute-force path traversal attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>vulnerability</category><category>web-application</category></item><item><title>Tenda i9 Path Traversal Vulnerability (CVE-2026-7036)</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-path-traversal/</link><pubDate>Sun, 26 Apr 2026 12:16:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-path-traversal/</guid><description>CVE-2026-7036 is a path traversal vulnerability affecting the R7WebsSecurityHandlerfunction in the HTTP Handler component of Tenda i9 version 1.0.0.5(2204), allowing remote attackers to access sensitive files.</description><content:encoded><![CDATA[<p>A path traversal vulnerability, identified as CVE-2026-7036, exists in Tenda i9 version 1.0.0.5(2204). Specifically, the vulnerability resides in the R7WebsSecurityHandlerfunction of the HTTP Handler component. This flaw allows a remote, unauthenticated attacker to potentially access sensitive files and directories on the affected device. The vulnerability was reported on 2026-04-26, and a public exploit is reportedly available, increasing the risk of exploitation. This poses a significant threat to organizations using the affected Tenda i9 router, as it could lead to unauthorized access to sensitive information or system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a Tenda i9 router running firmware version 1.0.0.5(2204) accessible over the network.</li>
<li>The attacker crafts a malicious HTTP request targeting the vulnerable R7WebsSecurityHandlerfunction.</li>
<li>The crafted request includes a path traversal sequence (e.g., &ldquo;../&rdquo;) within the URL or request parameters.</li>
<li>The Tenda i9 router processes the malicious request without proper sanitization of the path.</li>
<li>The R7WebsSecurityHandlerfunction incorrectly interprets the path traversal sequence, allowing access to files or directories outside the intended web root.</li>
<li>The attacker gains unauthorized access to sensitive files, such as configuration files or system logs.</li>
<li>The attacker may use the exposed information to further compromise the device or the network it is connected to.</li>
<li>The attacker could potentially modify system files or execute commands, leading to full device compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7036 can lead to unauthorized access to sensitive files on the Tenda i9 router. This includes configuration files containing credentials, system logs, or other confidential data. An attacker could leverage this access to gain further control of the device, potentially leading to a complete system compromise. While the number of affected devices is currently unknown, given the widespread use of Tenda routers, the potential impact could be significant.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to detect HTTP requests containing path traversal sequences targeting web servers to detect exploitation attempts (Sigma rule: &ldquo;Detect Tenda i9 Path Traversal Attempt&rdquo;).</li>
<li>Since the source mentions a public exploit exists, prioritize patching or replacing vulnerable Tenda i9 routers to remediate CVE-2026-7036 immediately, if a patch becomes available.</li>
<li>Monitor web server logs for unusual file access patterns or requests containing suspicious path traversal sequences.</li>
<li>Implement web application firewall (WAF) rules to block requests containing path traversal sequences.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-7036</category><category>path-traversal</category><category>tenda</category><category>network</category></item><item><title>Radare2 Path Traversal Vulnerability in Project Deletion</title><link>https://feed.craftedsignal.io/briefs/2026-04-radare2-path-traversal/</link><pubDate>Thu, 23 Apr 2026 21:16:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-radare2-path-traversal/</guid><description>Radare2 versions prior to 6.1.4 are vulnerable to a path traversal in project deletion, allowing local attackers to recursively delete arbitrary directories by escaping the 'dir.projects' root, leading to integrity and availability loss.</description><content:encoded><![CDATA[<p>Radare2, a reverse engineering framework, is susceptible to a path traversal vulnerability (CVE-2026-6940) affecting versions prior to 6.1.4. This flaw allows a local attacker to delete arbitrary directories outside of the intended project storage location. By crafting project marker files with absolute paths that escape the configured <code>dir.projects</code> root directory, an attacker can trick the radare2 process into recursively deleting directories they should not have access to. This vulnerability poses a significant risk to system integrity and availability, as attackers can potentially delete critical system files or data. This vulnerability was published on 2026-04-23 and could be exploited immediately.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains local access to a system with radare2 installed.</li>
<li>Attacker identifies the location where radare2 stores project files (configured by <code>dir.projects</code>).</li>
<li>Attacker crafts a malicious radare2 project file containing an absolute path pointing outside the designated project directory. This path includes traversal sequences (e.g., <code>../</code>) to escape the <code>dir.projects</code> root.</li>
<li>The attacker places the malicious project marker file in a location where radare2 will discover it (e.g. a default projects directory).</li>
<li>Attacker uses radare2&rsquo;s project deletion functionality, specifying the malicious project for deletion.</li>
<li>Radare2, without proper validation of the project file path, recursively deletes the directory specified in the crafted path.</li>
<li>This deletion occurs with the permissions of the radare2 process, potentially allowing the attacker to delete files and directories they would normally not have access to.</li>
<li>The attacker achieves arbitrary directory deletion, leading to loss of system integrity and availability.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a local attacker to recursively delete arbitrary directories on the affected system. This can lead to significant data loss, system instability, and denial of service. The CVSS v3.1 base score for this vulnerability is 7.1, indicating a high level of severity. While no specific victim numbers or sector targeting have been disclosed, the potential impact on any system running a vulnerable version of radare2 is substantial.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade radare2 to version 6.1.4 or later to patch CVE-2026-6940.</li>
<li>Implement the process creation rule below to detect suspicious radare2 executions that could indicate exploitation attempts.</li>
<li>Consider limiting local user access to systems running radare2 to reduce the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>radare2</category><category>local-privilege-escalation</category></item><item><title>SiYuan Path Traversal via Double URL Encoding in `/export/` Endpoint</title><link>https://feed.craftedsignal.io/briefs/2026-04-siyuan-path-traversal/</link><pubDate>Wed, 22 Apr 2026 20:55:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-siyuan-path-traversal/</guid><description>SiYuan is vulnerable to path traversal via double URL encoding in the `/export/` endpoint, bypassing an incomplete fix for CVE-2026-30869; an authenticated attacker can exploit this vulnerability to traverse directories and read arbitrary workspace files, including the SQLite database (`siyuan.db`), kernel log, and user documents due to a redundant `url.PathUnescape()` call in `serveExport()`.</description><content:encoded><![CDATA[<p>SiYuan is vulnerable to a path traversal vulnerability (CVE-2026-30869) due to a redundant <code>url.PathUnescape()</code> call within the <code>serveExport()</code> function. The vulnerability exists in versions prior to 3.6.5. This flaw allows an authenticated attacker, including low-privilege users with Publish/Reader roles, to bypass intended security restrictions and access sensitive files stored within the SiYuan workspace. The initial fix attempted with <code>IsSensitivePath()</code> proved insufficient as it did not address the core issue of double URL decoding. An attacker can exploit this vulnerability by using double URL encoded characters in a crafted HTTP request, allowing them to read arbitrary files such as the complete SQLite document database (<code>siyuan.db</code>), kernel logs, and other critical files.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated attacker sends a GET request to the <code>/export/</code> endpoint with a double URL encoded path, such as <code>/export/%252e%252e/siyuan.db</code>.</li>
<li>The Go HTTP server decodes the initial layer of URL encoding, transforming <code>%25</code> into <code>%</code>, resulting in a path like <code>/export/%2e%2e/siyuan.db</code>.</li>
<li>The path cleaner does not recognize <code>%2e%2e</code> as directory traversal, so it passes through.</li>
<li>The <code>serveExport()</code> function then calls <code>url.PathUnescape()</code> on the path, decoding <code>%2e%2e</code> into <code>..</code>.</li>
<li>The <code>filepath.Join()</code> function concatenates the <code>exportBaseDir</code> with the now decoded path, e.g., <code>&lt;workspace&gt;/../siyuan.db</code>.</li>
<li>The <code>IsSensitivePath()</code> check fails to block the request because it doesn&rsquo;t account for the decoded path or specific database files in the <code>temp/</code> directory.</li>
<li>The attacker successfully retrieves the contents of the <code>siyuan.db</code> file, which contains the complete document database.</li>
<li>The attacker repeats the process to access other sensitive files within the workspace, such as <code>siyuan.log</code>, <code>blocktree.db</code>, and <code>asset_content.db</code>.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to exfiltrate sensitive data, including the entire SQLite document database, potentially containing all user documents, attributes, and search indexes. The attacker can also access the kernel log, which may contain internal server paths, versions, configuration details, and error messages. This information disclosure could lead to further compromise of the system. While the number of victims is unknown, any SiYuan instance running a version prior to 3.6.5 is potentially vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade SiYuan to version 3.6.5 or later to remediate the vulnerability.</li>
<li>Deploy the provided Sigma rule <code>Detect SiYuan Path Traversal Attempt</code> to detect attempts to exploit this vulnerability by monitoring for double URL encoded characters in requests to the <code>/export/</code> endpoint.</li>
<li>Monitor web server logs for requests to the <code>/export/</code> endpoint containing <code>%252e%252e</code> to identify potential exploitation attempts.</li>
<li>Consider implementing a more robust path validation mechanism within the <code>serveExport()</code> function that properly handles URL decoding and directory traversal attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>web-application</category><category>siYuan</category></item><item><title>InstructLab Path Traversal Vulnerability (CVE-2026-6855)</title><link>https://feed.craftedsignal.io/briefs/2026-04-instructlab-path-traversal/</link><pubDate>Wed, 22 Apr 2026 13:16:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-instructlab-path-traversal/</guid><description>A local attacker can exploit a path traversal vulnerability in InstructLab by manipulating the `logs_dir` parameter, leading to arbitrary file creation and modification.</description><content:encoded>&lt;p>CVE-2026-6855 describes a path traversal vulnerability found in InstructLab, a tool or platform that allows for interactive instruction or learning sessions. A local attacker can exploit this vulnerability by manipulating the &lt;code>logs_dir&lt;/code> parameter within the chat session handler. This manipulation allows the attacker to bypass intended directory restrictions and gain the ability to create new directories and write files to arbitrary locations on the affected system. The vulnerability was…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>instructlab</category><category>cve-2026-6855</category></item><item><title>WWBN AVideo Unauthenticated Path Traversal Vulnerability (CVE-2026-41058)</title><link>https://feed.craftedsignal.io/briefs/2026-04-avideo-path-traversal/</link><pubDate>Wed, 22 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-avideo-path-traversal/</guid><description>WWBN AVideo versions 29.0 and below contain a path traversal vulnerability (CVE-2026-41058) in the CloneSite functionality, allowing unauthenticated attackers to delete arbitrary files via manipulation of the `deleteDump` parameter.</description><content:encoded><![CDATA[<p>WWBN AVideo is an open-source video platform. Versions 29.0 and below are vulnerable to a path traversal vulnerability (CVE-2026-41058) due to an incomplete fix for the <code>deleteDump</code> parameter in the CloneSite functionality. This vulnerability allows unauthenticated attackers to delete arbitrary files on the server by injecting <code>../../</code> sequences into the GET request. The vulnerability was reported on April 21, 2026, and a fix is available in commit 3c729717c26f160014a5c86b0b6accdbd613e7b2. Successful exploitation allows attackers to potentially disrupt service, delete sensitive data, or escalate privileges depending on the file permissions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an AVideo instance running version 29.0 or below.</li>
<li>The attacker crafts a malicious HTTP GET request targeting the CloneSite functionality.</li>
<li>The attacker injects a path traversal sequence (e.g., <code>../../</code>) into the <code>deleteDump</code> parameter of the GET request.</li>
<li>The AVideo application fails to properly sanitize the <code>deleteDump</code> parameter.</li>
<li>The <code>unlink()</code> function is called with the attacker-controlled path, allowing deletion of arbitrary files.</li>
<li>The attacker uses the vulnerability to delete critical system files or configuration files.</li>
<li>The application or server becomes unstable or inoperable.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41058 allows unauthenticated attackers to delete arbitrary files on the AVideo server. This can lead to denial of service, data loss, or potential privilege escalation if critical system files are deleted. The vulnerability affects all AVideo instances running version 29.0 or below, potentially impacting a large number of users and organizations relying on the platform.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade AVideo instances to a version containing the fix from commit 3c729717c26f160014a5c86b0b6accdbd613e7b2 to address CVE-2026-41058.</li>
<li>Deploy the Sigma rule <code>Detect AVideo Path Traversal Attempt</code> to identify exploitation attempts in web server logs.</li>
<li>Implement web application firewall (WAF) rules to block requests containing path traversal sequences in the <code>deleteDump</code> parameter.</li>
<li>Monitor web server logs for suspicious activity related to the CloneSite functionality and the <code>deleteDump</code> parameter.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path traversal</category><category>cve-2026-41058</category><category>avideo</category><category>webserver</category></item><item><title>Hermes WebUI Arbitrary File Deletion Vulnerability (CVE-2026-6832)</title><link>https://feed.craftedsignal.io/briefs/2026-04-hermes-file-deletion/</link><pubDate>Wed, 22 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-hermes-file-deletion/</guid><description>Hermes WebUI is vulnerable to arbitrary file deletion via path traversal in the /api/session/delete endpoint due to insufficient validation of the session_id parameter, allowing authenticated attackers to delete writable JSON files on the host system.</description><content:encoded><![CDATA[<p>Hermes WebUI, a web-based user interface, contains an arbitrary file deletion vulnerability, tracked as CVE-2026-6832. The vulnerability resides in the <code>/api/session/delete</code> endpoint. An authenticated attacker can exploit this flaw by supplying a crafted <code>session_id</code> parameter containing an absolute path or path traversal sequences. This allows the attacker to bypass the intended <code>SESSION_DIR</code> boundary and delete arbitrary files on the server, provided the attacker has write access to those files. Versions prior to the patched version are affected. Successful exploitation leads to information integrity issues and potential denial of service.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to Hermes WebUI using valid credentials.</li>
<li>Attacker crafts a malicious HTTP POST request to the <code>/api/session/delete</code> endpoint.</li>
<li>The request includes a <code>session_id</code> parameter with a path traversal payload (e.g., <code>../../../../etc/passwd</code>) or an absolute path to a target file.</li>
<li>The Hermes WebUI application fails to properly validate the <code>session_id</code> parameter.</li>
<li>The application constructs a file path using the unvalidated <code>session_id</code>, allowing it to escape the intended <code>SESSION_DIR</code>.</li>
<li>The application attempts to delete the file specified by the attacker-controlled path.</li>
<li>If the attacker has sufficient privileges, the target file is successfully deleted from the file system.</li>
<li>The deletion of critical system or application files leads to a denial-of-service condition or other system instability.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6832 allows authenticated attackers to delete arbitrary files on the system running Hermes WebUI. This can lead to data loss, application malfunction, or even complete system compromise if critical system files are deleted. The vulnerability affects all deployments of Hermes WebUI prior to the patched version, potentially impacting numerous organizations using the vulnerable software. While the exact number of victims is unknown, the severity of the vulnerability is high due to the potential for significant damage and disruption.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Hermes WebUI to version v0.50.132 or later, where the vulnerability is patched, as referenced in the advisory.</li>
<li>Implement strict input validation on the <code>session_id</code> parameter in the <code>/api/session/delete</code> endpoint to prevent path traversal attacks.</li>
<li>Deploy the provided Sigma rule to detect malicious requests to the <code>/api/session/delete</code> endpoint containing path traversal sequences.</li>
<li>Monitor web server logs for HTTP requests to <code>/api/session/delete</code> with suspicious <code>session_id</code> values.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-6832</category><category>path-traversal</category><category>file-deletion</category><category>webui</category></item><item><title>CrowdStrike LogScale Unauthenticated Path Traversal Vulnerability (CVE-2026-40050)</title><link>https://feed.craftedsignal.io/briefs/2026-04-crowdstrike-logscale-path-traversal/</link><pubDate>Wed, 22 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-crowdstrike-logscale-path-traversal/</guid><description>A critical unauthenticated path traversal vulnerability (CVE-2026-40050) in CrowdStrike LogScale allows remote attackers to read arbitrary files from the server filesystem if a specific cluster API endpoint is exposed, necessitating immediate patching for self-hosted customers.</description><content:encoded><![CDATA[<p>CrowdStrike has disclosed CVE-2026-40050, a critical unauthenticated path traversal vulnerability affecting specific versions of LogScale. This vulnerability allows unauthenticated remote attackers to read arbitrary files from the server&rsquo;s filesystem. The vulnerability resides in a specific cluster API endpoint. CrowdStrike mitigated the vulnerability for LogScale SaaS customers on April 7, 2026, by deploying network-layer blocks. CrowdStrike self-hosted LogScale customers are urged to upgrade to a patched version immediately to remediate the vulnerability. The vulnerability was identified through CrowdStrike&rsquo;s internal product testing. Next-Gen SIEM customers are not affected.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable LogScale instance with the exposed cluster API endpoint.</li>
<li>Attacker crafts a malicious HTTP request containing a path traversal payload targeting the vulnerable API endpoint.</li>
<li>The crafted request bypasses authentication checks due to the vulnerability.</li>
<li>LogScale server processes the request and attempts to access the file specified in the path traversal payload.</li>
<li>Due to the missing input validation, the server accesses files outside the intended directory.</li>
<li>The server reads the contents of the targeted file from the filesystem.</li>
<li>The file content is included in the HTTP response sent back to the attacker.</li>
<li>Attacker obtains sensitive information from the server&rsquo;s filesystem, such as configuration files, credentials, or internal data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40050 allows an unauthenticated remote attacker to read arbitrary files on the LogScale server. This could lead to the exposure of sensitive data, including configuration files, credentials, and internal application data. The vulnerability affects self-hosted LogScale customers who have not applied the necessary security updates. The impact could be severe, potentially leading to data breaches or unauthorized access to the system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade self-hosted LogScale instances to the latest patched version to remediate CVE-2026-40050 immediately.</li>
<li>Monitor web server logs for suspicious requests containing path traversal patterns targeting LogScale&rsquo;s API endpoints to detect potential exploitation attempts (see rule: &ldquo;Detect LogScale Path Traversal Attempts&rdquo;).</li>
<li>Deploy network-layer blocks to restrict access to the vulnerable API endpoint if immediate patching is not feasible.</li>
<li>Review access controls and network segmentation to limit the impact of potential future vulnerabilities.</li>
<li>Enable webserver logging to capture cs-uri-query, cs-uri-stem, and cs-method to improve visibility and incident response.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>path-traversal</category><category>vulnerability</category><category>logscale</category><category>crowdstrike</category></item><item><title>JetBrains TeamCity Authentication Bypass and Path Traversal Vulnerabilities</title><link>https://feed.craftedsignal.io/briefs/2026-04-jetbrains-teamcity-vulns/</link><pubDate>Wed, 22 Apr 2026 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-jetbrains-teamcity-vulns/</guid><description>Unpatched JetBrains TeamCity servers are being actively exploited via an authentication bypass (CVE-2024-27198) and path traversal vulnerability (CVE-2024-27199), allowing attackers to perform administrative actions and potentially conduct supply-chain attacks.</description><content:encoded><![CDATA[<p>JetBrains TeamCity, a CI/CD software platform, is vulnerable to CVE-2024-27198, an authentication bypass, and CVE-2024-27199, a path traversal vulnerability. These flaws affect TeamCity versions prior to 2023.11.4. Initially, there was no observed active exploitation. However, by March 7, 2024, widespread exploitation was detected following the public availability of proof-of-concept code. Attackers are actively exploiting these vulnerabilities to create new user accounts on publicly exposed, unpatched TeamCity instances. A substantial number of compromised servers are utilized as production machines for software building and deployment. These attacks have the potential to lead to supply-chain compromises by exposing sensitive information. CISA added CVE-2024-27199 to its Known Exploited Vulnerabilities catalog on April 20, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a crafted HTTP request to a vulnerable TeamCity server, exploiting CVE-2024-27198 to bypass authentication.</li>
<li>Once authenticated (or bypassing authentication), the attacker leverages CVE-2024-27199, a path traversal vulnerability, to access sensitive files and directories on the server.</li>
<li>The attacker reads configuration files containing credentials for other systems and services.</li>
<li>The attacker creates new administrative user accounts on the TeamCity server to ensure persistent access.</li>
<li>The attacker modifies build configurations to inject malicious code into software builds.</li>
<li>The attacker compromises the software supply chain by injecting malicious code into build artifacts.</li>
<li>The attacker uses stolen credentials to access deployment environments and deploy compromised builds.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to perform administrative actions on affected TeamCity servers, leading to a compromise of confidentiality, integrity, and availability of data and infrastructure. The compromise of TeamCity servers used for software building and deployment can result in supply-chain attacks, as these servers often contain sensitive information, such as credentials for deployment environments. A substantial portion of compromised TeamCity servers are utilized as production machines for software building and deployment processes, increasing the scope and impact of potential supply chain attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately patch all JetBrains TeamCity servers to version 2023.11.4 or later to remediate CVE-2024-27198 and CVE-2024-27199 (Reference: <a href="https://www.jetbrains.com/privacy-security/issues-fixed/)">https://www.jetbrains.com/privacy-security/issues-fixed/)</a>.</li>
<li>Deploy the Sigma rule &ldquo;Detect TeamCity Authentication Bypass Attempt&rdquo; to your SIEM to detect exploitation attempts of CVE-2024-27198.</li>
<li>Enable web server logging and increase monitoring to detect suspicious activity related to path traversal attempts indicative of CVE-2024-27199 exploitation.</li>
<li>Monitor for the creation of new user accounts within TeamCity, especially administrative accounts, which could indicate successful exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>teamcity</category><category>vulnerability</category><category>authentication bypass</category><category>path traversal</category><category>supply-chain</category></item><item><title>Apktool Path Traversal Vulnerability (CVE-2026-39973)</title><link>https://feed.craftedsignal.io/briefs/2026-04-apktool-path-traversal/</link><pubDate>Tue, 21 Apr 2026 02:16:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-apktool-path-traversal/</guid><description>A path traversal vulnerability in Apktool versions 3.0.0 and 3.0.1 allows a malicious APK file to write arbitrary files to the filesystem during decoding, potentially leading to remote code execution.</description><content:encoded><![CDATA[<p>Apktool, a tool used for reverse engineering Android APK files, is vulnerable to a path traversal issue in versions 3.0.0 and 3.0.1 (CVE-2026-39973). This vulnerability resides within the <code>brut/androlib/res/decoder/ResFileDecoder.java</code> component. A maliciously crafted APK can exploit this flaw during standard decoding (<code>apktool d</code>) to write arbitrary files to the filesystem. The vulnerability is a security regression introduced by commit e10a045 (PR #4041, December 12, 2025), which inadvertently removed the <code>BrutIO.sanitizePath()</code> call, a crucial safeguard against path traversal attacks. By embedding <code>../</code> sequences in the <code>resources.arsc</code> Type String Pool, attackers can bypass directory restrictions and write files to sensitive locations, such as <code>~/.ssh/config</code>, <code>~/.bashrc</code>, or Windows Startup folders, ultimately enabling remote code execution. Apktool version 3.0.2 addresses this vulnerability by reintroducing the <code>BrutIO.sanitizePath()</code> function in <code>ResFileDecoder.java</code>, effectively mitigating the path traversal risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious Android APK file.</li>
<li>The attacker embeds <code>../</code> sequences within the <code>resources.arsc</code> Type String Pool of the APK.</li>
<li>A user attempts to decode the malicious APK file using a vulnerable version of Apktool (3.0.0 or 3.0.1) via the command <code>apktool d malicious.apk</code>.</li>
<li>During the decoding process, the <code>ResFileDecoder.java</code> component processes the <code>resources.arsc</code> file.</li>
<li>Due to the missing <code>BrutIO.sanitizePath()</code> call, the <code>../</code> sequences are not sanitized, allowing path traversal.</li>
<li>Apktool attempts to write a resource file to a location outside the intended output directory.</li>
<li>The resource file is written to an arbitrary location on the filesystem, potentially overwriting critical system files (e.g., <code>~/.bashrc</code>, <code>~/.ssh/config</code>).</li>
<li>If a file like <code>~/.bashrc</code> is overwritten, subsequent shell sessions execute malicious code, achieving remote code execution. If a Windows Startup folder is targeted, the code executes on the next reboot.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to write arbitrary files to the filesystem of the machine running Apktool. This can lead to various malicious outcomes, including remote code execution, privilege escalation, and data exfiltration. The impact is particularly severe if Apktool is run with elevated privileges or if sensitive files are overwritten. While specific victim numbers are not available, developers and security researchers who rely on Apktool for APK analysis are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to Apktool version 3.0.2 or later to remediate CVE-2026-39973.</li>
<li>Implement file integrity monitoring on sensitive files like <code>~/.bashrc</code> and <code>~/.ssh/config</code> to detect unauthorized modifications.</li>
<li>Enable process monitoring to detect the execution of <code>apktool d</code> with suspicious arguments, particularly targeting unexpected output directories.</li>
<li>Deploy the Sigma rule &ldquo;Detect Apktool Path Traversal Attempt&rdquo; to identify potential exploitation attempts based on command-line arguments.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>apktool</category><category>path-traversal</category><category>android</category><category>cve-2026-39973</category></item><item><title>ThreatSonar Anti-Ransomware Arbitrary File Deletion Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-threatsonar-file-deletion/</link><pubDate>Mon, 20 Apr 2026 08:16:11 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-threatsonar-file-deletion/</guid><description>TeamT5's ThreatSonar Anti-Ransomware is vulnerable to arbitrary file deletion via path traversal, allowing authenticated remote attackers with web access to delete arbitrary files on the system.</description><content:encoded><![CDATA[<p>CVE-2026-5966 describes an arbitrary file deletion vulnerability in TeamT5&rsquo;s ThreatSonar Anti-Ransomware. The vulnerability allows authenticated remote attackers with web access to exploit a path traversal flaw. This means that an attacker who already has valid credentials to access the web interface of ThreatSonar Anti-Ransomware can craft malicious requests to delete files that the application user has access to, regardless of their intended purpose or location. The CVSS v3.1 score is 8.1, indicating a high severity. The vulnerable software is ThreatSonar Anti-Ransomware from TeamT5.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains valid credentials to the ThreatSonar Anti-Ransomware web interface, likely through credential stuffing or phishing.</li>
<li>The attacker authenticates to the ThreatSonar Anti-Ransomware web application.</li>
<li>The attacker identifies an endpoint within the web application that handles file operations (e.g., backup, restore, quarantine).</li>
<li>The attacker crafts a malicious HTTP request to this endpoint containing a path traversal payload in a filename or filepath parameter (e.g., <code>../../../../windows/system32/drivers/etc/hosts</code>).</li>
<li>The web application processes the request without proper sanitization or validation of the file path.</li>
<li>The application attempts to delete the file specified by the attacker-controlled path.</li>
<li>If the application user has sufficient privileges, the arbitrary file is deleted from the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows authenticated attackers to delete arbitrary files on the system where ThreatSonar Anti-Ransomware is installed. This could lead to denial of service by deleting critical system files, data loss by deleting important data files, or potentially escalate privileges by deleting files used in privilege escalation techniques.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade to the latest version of ThreatSonar Anti-Ransomware as provided by TeamT5 to address CVE-2026-5966.</li>
<li>Implement input validation and sanitization on all file path parameters within the ThreatSonar Anti-Ransomware web application to prevent path traversal attacks.</li>
<li>Monitor web server logs for suspicious requests containing path traversal sequences (e.g., <code>../</code>, <code>..\\</code>) in file-related parameters to detect potential exploitation attempts. Deploy the Sigma rule for webserver logs.</li>
<li>Implement principle of least privilege and regularly audit user permissions in ThreatSonar Anti-Ransomware.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>vulnerability</category><category>file-deletion</category><category>path-traversal</category></item><item><title>KodExplorer Path Traversal Vulnerability (CVE-2026-6568)</title><link>https://feed.craftedsignal.io/briefs/2026-04-kodexplorer-path-traversal/</link><pubDate>Sun, 19 Apr 2026 10:16:09 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-kodexplorer-path-traversal/</guid><description>KodExplorer up to version 4.52 is vulnerable to a path traversal attack via manipulation of the path argument in the share.class.php::initShareOld function, potentially allowing remote attackers to access sensitive files.</description><content:encoded><![CDATA[<p>A path traversal vulnerability, identified as CVE-2026-6568, affects kodcloud KodExplorer up to version 4.52. The vulnerability resides within the <code>share.class.php::initShareOld</code> function in the <code>/app/controller/share.class.php</code> file, a part of the Public Share Handler component. An attacker can exploit this flaw by manipulating the <code>path</code> argument, leading to unauthorized access to files and directories outside of the intended share path. Public exploit code is available, increasing the risk of active exploitation. The vendor was notified, but has not responded.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a KodExplorer instance running version 4.52 or earlier.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/app/controller/share.class.php</code> endpoint.</li>
<li>The request includes a manipulated <code>path</code> argument designed to traverse directories outside the intended share path (e.g., <code>../../../../etc/passwd</code>).</li>
<li>The <code>share.class.php::initShareOld</code> function processes the request without proper sanitization of the <code>path</code> argument.</li>
<li>The application attempts to access the file specified by the attacker-controlled path.</li>
<li>If successful, the application reads and potentially displays the contents of the targeted file (e.g., <code>/etc/passwd</code>) to the attacker.</li>
<li>The attacker analyzes the retrieved information to gather sensitive data, such as usernames, system configurations, or database credentials.</li>
<li>The attacker leverages the compromised information to further compromise the system or gain access to other sensitive resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6568 can allow an unauthenticated remote attacker to read arbitrary files on the KodExplorer server. This may lead to the disclosure of sensitive information such as configuration files, user credentials, or source code. The vulnerability poses a significant risk to organizations using affected versions of KodExplorer. The number of potential victims is unknown, but it is likely to affect any organization using the vulnerable software.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply input validation to the <code>path</code> parameter within the <code>share.class.php::initShareOld</code> function to prevent path traversal (reference CVE-2026-6568).</li>
<li>Deploy the Sigma rule &ldquo;Detect KodExplorer Path Traversal Attempt&rdquo; to identify malicious requests targeting the vulnerable endpoint.</li>
<li>Monitor web server logs for suspicious requests containing path traversal sequences (e.g., &ldquo;../&rdquo;, &ldquo;..&quot;, &ldquo;%2e%2e/&rdquo;).</li>
<li>Block access to the malicious URLs listed in the IOC table at the network perimeter.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>path-traversal</category><category>kodexplorer</category><category>cve-2026-6568</category></item><item><title>Firebird Path Traversal Vulnerability Leads to Code Execution (CVE-2026-40342)</title><link>https://feed.craftedsignal.io/briefs/2026-04-firebird-path-traversal/</link><pubDate>Fri, 17 Apr 2026 20:16:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-firebird-path-traversal/</guid><description>An authenticated user with CREATE FUNCTION privileges can exploit a path traversal vulnerability in Firebird versions prior to 5.0.4, 4.0.7, and 3.0.14, to load an arbitrary shared library leading to code execution as the server's OS account.</description><content:encoded><![CDATA[<p>Firebird, an open-source relational database management system, is vulnerable to a path traversal flaw (CVE-2026-40342) in versions prior to 5.0.4, 4.0.7, and 3.0.14. This vulnerability resides within the external engine plugin loader. The loader concatenates a user-supplied engine name into a filesystem path without proper sanitization, leaving it open to path traversal attacks. An authenticated user with <code>CREATE FUNCTION</code> privileges can craft a malicious <code>ENGINE</code> name containing path separators and <code>..</code> components. This allows them to load an arbitrary shared library from anywhere on the filesystem. The library&rsquo;s initialization code executes immediately upon loading, before Firebird can validate the module, effectively granting code execution under the security context of the server&rsquo;s operating system account. Upgrading to versions 5.0.4, 4.0.7, or 3.0.14 resolves this issue.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the Firebird database server with an account possessing <code>CREATE FUNCTION</code> privileges.</li>
<li>Attacker crafts a malicious <code>ENGINE</code> name that includes path traversal sequences (e.g., <code>../../../../</code>).</li>
<li>The attacker uses the crafted <code>ENGINE</code> name in a <code>CREATE FUNCTION</code> statement, specifying a path to an arbitrary shared library on the filesystem. For example, <code>CREATE FUNCTION evil_func RETURNS INTEGER ENGINE '/path/to/evil/../../../../tmp/evil.so'</code>.</li>
<li>The Firebird server&rsquo;s plugin loader concatenates the provided <code>ENGINE</code> name into a filesystem path without proper validation.</li>
<li>The Firebird server attempts to load the shared library from the attacker-controlled path, effectively bypassing intended access controls.</li>
<li>The operating system loads the shared library into the Firebird server&rsquo;s process.</li>
<li>The shared library&rsquo;s initialization code executes immediately, granting the attacker arbitrary code execution within the context of the Firebird server process.</li>
<li>The attacker gains control of the Firebird server&rsquo;s OS account, potentially leading to data exfiltration, system compromise, or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary code on the Firebird server with the privileges of the operating system account running the Firebird service. This can lead to full system compromise, including data exfiltration, modification, or destruction. Given the high CVSS score of 9.9, this vulnerability poses a critical risk to organizations using vulnerable Firebird versions. The impact could range from complete database compromise to lateral movement within the network, depending on the privileges of the Firebird service account.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Firebird servers to versions 5.0.4, 4.0.7, or 3.0.14 to patch CVE-2026-40342.</li>
<li>Monitor Firebird server logs for <code>CREATE FUNCTION</code> statements with suspicious <code>ENGINE</code> names containing path traversal sequences, and deploy the Sigma rule <code>Detect Firebird Create Function Path Traversal</code> to your SIEM.</li>
<li>Implement strict access controls to limit <code>CREATE FUNCTION</code> privileges to only authorized users, and enable audit logging on all Firebird database servers to monitor user activity.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>firebird</category><category>path-traversal</category><category>code-execution</category><category>cve-2026-40342</category><category>database</category></item><item><title>ByteDance DeerFlow Path Traversal and Arbitrary File Write Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-deerflow-path-traversal/</link><pubDate>Fri, 17 Apr 2026 17:17:09 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-deerflow-path-traversal/</guid><description>ByteDance DeerFlow before commit 2176b2b contains a path traversal and arbitrary file write vulnerability in bootstrap-mode custom-agent creation where the agent name validation is bypassed, allowing attackers to write files outside the intended custom-agent directory.</description><content:encoded><![CDATA[<p>ByteDance DeerFlow, a software of unknown purpose, prior to commit 2176b2b, is vulnerable to path traversal and arbitrary file write. The vulnerability lies within the bootstrap-mode custom-agent creation process, specifically due to insufficient validation of the agent name. This flaw allows attackers to bypass intended directory restrictions and write files to arbitrary locations on the system, provided they have the necessary filesystem permissions. The vulnerability was reported on April 17, 2026 and has been assigned CVE-2026-40518. Exploitation of this vulnerability could lead to privilege escalation and system compromise. Defenders should prioritize patching or mitigating this vulnerability to prevent unauthorized file modifications.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains low-privileged access to the DeerFlow application.</li>
<li>Attacker initiates the creation of a custom agent in bootstrap mode.</li>
<li>The attacker crafts a malicious agent name containing path traversal sequences (e.g., &ldquo;../&rdquo;, absolute paths).</li>
<li>The DeerFlow application fails to properly validate the agent name.</li>
<li>The application uses the attacker-supplied agent name to create directories.</li>
<li>The path traversal in the agent name allows the application to create directories outside the intended custom-agent directory.</li>
<li>The attacker uploads files as part of the custom agent creation.</li>
<li>The application writes these files to the attacker-controlled location, resulting in arbitrary file write.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to write arbitrary files to the file system, potentially overwriting system files or planting malicious executables. This could lead to privilege escalation, arbitrary code execution, and complete system compromise. While the number of affected installations is unknown, any system running a vulnerable version of ByteDance DeerFlow is susceptible to this attack. The severity is compounded by the ease of exploitation, requiring only low-privileged access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade to a version of ByteDance DeerFlow that includes commit 2176b2b to remediate the vulnerability referenced by CVE-2026-40518.</li>
<li>Implement the Sigma rule <code>Detect Suspicious DeerFlow Agent Creation</code> to detect exploitation attempts targeting CVE-2026-40518 by monitoring process creation events.</li>
<li>Monitor web server logs for unusual activity related to custom agent creation endpoints in DeerFlow to detect potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>file-write</category><category>bytedance</category><category>deerflow</category></item><item><title>OCaml opam Path Traversal Vulnerability (CVE-2026-41082)</title><link>https://feed.craftedsignal.io/briefs/2026-04-opam-path-traversal/</link><pubDate>Fri, 17 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-opam-path-traversal/</guid><description>OCaml opam before 2.5.1 is vulnerable to path traversal via a crafted .install file, potentially allowing attackers to overwrite arbitrary files.</description><content:encoded><![CDATA[<p>OCaml opam, a package manager for OCaml, is susceptible to a path traversal vulnerability (CVE-2026-41082) in versions prior to 2.5.1. The vulnerability stems from insufficient validation of filepaths specified within the &ldquo;.install&rdquo; files used to define package installation procedures. Specifically, the &ldquo;.install&rdquo; field, which dictates the destination of installed files, permits the inclusion of &ldquo;../&rdquo; sequences. This oversight can be exploited by malicious package maintainers or compromised repositories to overwrite files outside the intended installation directory. This allows attackers to manipulate critical system files, potentially escalating privileges and compromising the entire system. The impact is significant for developers and systems relying on opam for package management, as it introduces a risk of arbitrary file modification and subsequent system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious OCaml package containing a specially crafted &ldquo;.install&rdquo; file.</li>
<li>The malicious &ldquo;.install&rdquo; file contains a destination filepath that utilizes &ldquo;../&rdquo; sequences to traverse to parent directories.</li>
<li>A user unknowingly installs the malicious package using <code>opam install &lt;package&gt;</code>.</li>
<li>Opam parses the &ldquo;.install&rdquo; file and executes the file installation instructions.</li>
<li>Due to the path traversal vulnerability, opam writes files to unintended locations outside of the intended package directory.</li>
<li>The attacker overwrites critical system files, such as configuration files or binaries.</li>
<li>The system is compromised as a result of the overwritten files, potentially leading to privilege escalation or arbitrary code execution.</li>
<li>The attacker gains control of the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to arbitrary file overwrite, potentially resulting in privilege escalation, code execution, and complete system compromise. While the specific number of affected systems is unknown, any system utilizing OCaml opam versions before 2.5.1 is potentially vulnerable. This includes development environments, build servers, and production systems relying on OCaml packages installed through opam. A successful attack could lead to data loss, system instability, or unauthorized access to sensitive information.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OCaml opam to version 2.5.1 or later to remediate CVE-2026-41082 (see references).</li>
<li>Deploy the Sigma rule <code>Detect Opam Path Traversal in Install Files</code> to detect attempts to exploit this vulnerability by monitoring for suspicious file paths during opam package installation.</li>
<li>Implement strict controls over the packages and repositories used by opam to prevent the installation of malicious or compromised packages.</li>
<li>Regularly audit the &ldquo;.install&rdquo; files of installed packages for suspicious path traversal sequences.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>package-manager</category><category>ocaml</category></item><item><title>Multiple Critical Vulnerabilities in CISCO ISE Leading to Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-04-cisco-ise-rce/</link><pubDate>Fri, 17 Apr 2026 08:45:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-cisco-ise-rce/</guid><description>Multiple critical vulnerabilities in CISCO ISE (CVE-2026-20186, CVE-2026-20147, CVE-2026-20180) allow remote attackers with low privileges to execute arbitrary commands, potentially escalating privileges to root and causing denial-of-service.</description><content:encoded><![CDATA[<p>Cisco Identity Services Engine (ISE) versions 3.x.x (3.1.0 - 3.4.0, and 3.1.0 p1-p10, 3.2.0 p1-p7, 3.3 Patches 1-7, and 3.4 Patches 1-3) are vulnerable to three newly disclosed vulnerabilities that can lead to remote code execution. These vulnerabilities, CVE-2026-20186, CVE-2026-20147, and CVE-2026-20180, can be exploited by remote attackers with low privileges, such as having Read Only Admin credentials. Successful exploitation can result in service disruption, system takeover, and complete compromise of the ISE instance. The vulnerabilities involve command injection and path traversal due to insufficient validation of user-supplied input in HTTP request handling. There is currently no public proof-of-concept or proof-of-exploitation available.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to CISCO ISE with low-privilege credentials (e.g., Read Only Admin).</li>
<li>Attacker crafts a malicious HTTP request targeting a vulnerable endpoint within the ISE web application.</li>
<li>The crafted request exploits CVE-2026-20186 by injecting commands to escalate privileges to root.</li>
<li>Alternatively, the attacker exploits CVE-2026-20147 by sending a crafted HTTP request to execute arbitrary commands on the underlying operating system.</li>
<li>As another option, the attacker leverages CVE-2026-20180 by exploiting insufficient validation of user-supplied input, leading to remote code execution.</li>
<li>The injected commands or executed code elevates the attacker&rsquo;s privileges to root.</li>
<li>The attacker gains full control over the ISE system, enabling them to modify configurations, access sensitive data, or install malicious software.</li>
<li>In single-node ISE deployments, successful exploitation can lead to a denial-of-service condition, disrupting network authentication and authorization services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities allows attackers to gain complete control over the CISCO ISE system. This can lead to the compromise of sensitive network access policies, credentials, and other confidential information managed by ISE. The impact includes potential disruption of network services due to denial-of-service, unauthorized access to network resources, and the potential for lateral movement to other systems within the network. Given that ISE is a critical component for network access control, a successful attack can have widespread and severe consequences.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately patch vulnerable CISCO ISE instances to the latest version to remediate CVE-2026-20186, CVE-2026-20147, and CVE-2026-20180 (Cisco Security Advisory).</li>
<li>Implement enhanced monitoring and detection capabilities to identify suspicious activity related to these vulnerabilities (CCB Recommendation).</li>
<li>Investigate and remediate any existing compromises by reviewing system logs and configurations for unauthorized changes (CCB Recommendation).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cisco-ise</category><category>rce</category><category>command-injection</category><category>path-traversal</category></item><item><title>Unlimited Elements for Elementor WordPress Plugin Arbitrary File Read (CVE-2026-4659)</title><link>https://feed.craftedsignal.io/briefs/2026-04-wordpress-file-read/</link><pubDate>Fri, 17 Apr 2026 07:23:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wordpress-file-read/</guid><description>The Unlimited Elements for Elementor plugin for WordPress is vulnerable to arbitrary file read due to insufficient path traversal sanitization, allowing authenticated attackers to read sensitive files from the WordPress host.</description><content:encoded><![CDATA[<p>The Unlimited Elements for Elementor plugin, versions 2.0.6 and earlier, contains an arbitrary file read vulnerability (CVE-2026-4659). This vulnerability stems from inadequate sanitization of path traversal sequences within the <code>URLtoRelative()</code> and <code>urlToPath()</code> functions, particularly when combined with the ability to enable debug output. The <code>URLtoRelative()</code> function inadequately strips the base URL without properly sanitizing path traversal characters (<code>../</code>). Successful exploitation allows authenticated attackers with Author-level permissions or higher to access and read arbitrary local files on the WordPress host. This can include sensitive configuration files like <code>wp-config.php</code>, potentially exposing database credentials and other sensitive information.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the WordPress application with Author-level or higher privileges.</li>
<li>The attacker identifies the <code>Repeater JSON/CSV URL</code> parameter within the Unlimited Elements widget settings.</li>
<li>The attacker crafts a malicious URL containing path traversal sequences (e.g., <code>http://site.com/../../../../etc/passwd</code>) in the <code>Repeater JSON/CSV URL</code> parameter.</li>
<li>The crafted URL is passed to the <code>URLtoRelative()</code> function, which removes the base URL but fails to sanitize the path traversal sequences.</li>
<li>The resulting path (e.g., <code>/../../../../etc/passwd</code>) is concatenated with the base path by the application.</li>
<li>The <code>cleanPath()</code> function normalizes directory separators, but does not remove traversal components, leaving the path vulnerable.</li>
<li>The application resolves the path, leading to access of the targeted file (e.g., <code>/etc/passwd</code>).</li>
<li>The attacker retrieves the contents of the arbitrary file, such as <code>wp-config.php</code>, potentially extracting sensitive information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to read arbitrary files on the WordPress host. This can lead to the exposure of sensitive data, including database credentials, API keys, and other configuration settings stored in files like <code>wp-config.php</code>. The impact ranges from data leakage to potential full compromise of the WordPress installation and the underlying server, depending on the contents of the accessed files and the attacker&rsquo;s subsequent actions. The number of potentially affected WordPress sites is substantial, given the popularity of the Elementor plugin.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Unlimited Elements for Elementor plugin to a version greater than 2.0.6 to patch CVE-2026-4659.</li>
<li>Monitor web server logs for HTTP requests containing path traversal sequences (<code>../</code>) in the URI, focusing on requests targeting WordPress plugins; use the provided Sigma rule to facilitate this detection.</li>
<li>Implement stricter input validation and sanitization for URL parameters within WordPress plugins, specifically when handling file paths, to prevent path traversal vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>file-read</category><category>path-traversal</category><category>cve-2026-4659</category></item><item><title>Weblate Path Traversal Vulnerability in ZIP Download Feature (CVE-2026-34242)</title><link>https://feed.craftedsignal.io/briefs/2026-04-weblate-path-traversal/</link><pubDate>Wed, 15 Apr 2026 19:16:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-weblate-path-traversal/</guid><description>Weblate versions before 5.17 are vulnerable to path traversal due to improper verification of downloaded files in the ZIP download feature, potentially allowing attackers to access files outside the intended repository.</description><content:encoded><![CDATA[<p>Weblate, a web-based localization tool, has a path traversal vulnerability (CVE-2026-34242) affecting versions prior to 5.17. The vulnerability exists within the ZIP download feature, where the application fails to adequately verify downloaded files. This can allow an attacker to craft a malicious ZIP archive containing symbolic links that, when extracted by a user or the application itself, can lead to files outside of the intended repository being accessed. The vulnerability was reported and patched in version 5.17. Exploitation of this vulnerability requires a user to download and extract a maliciously crafted ZIP file.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a Weblate instance running a version prior to 5.17.</li>
<li>Attacker gains access to a translation project, either legitimately (e.g., as a translator) or illegitimately (e.g., via compromised credentials or another vulnerability).</li>
<li>Attacker crafts a malicious ZIP archive containing symbolic links that point to sensitive files or directories outside the intended Weblate repository (e.g., <code>/etc/passwd</code>, application configuration files).</li>
<li>Attacker uploads the malicious ZIP archive to the Weblate project, potentially disguised as a legitimate translation file.</li>
<li>A user (e.g., an administrator or another translator) downloads the ZIP archive using the ZIP download feature.</li>
<li>The user extracts the ZIP archive on their local machine or, if Weblate automatically processes the ZIP, on the server.</li>
<li>The symbolic links within the extracted archive are resolved, potentially allowing access to sensitive files or directories outside the Weblate repository.</li>
<li>Attacker gains unauthorized access to sensitive information, potentially leading to further compromise of the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this path traversal vulnerability (CVE-2026-34242) can allow an attacker to read arbitrary files on the server where Weblate is installed or on a user&rsquo;s machine if the user downloads and extracts the crafted ZIP archive locally. This could lead to the exposure of sensitive information such as application configuration files, database credentials, or even system-level files, depending on the permissions of the user or the Weblate application. The severity is rated as HIGH with a CVSS v3.1 score of 7.7.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Weblate to version 5.17 or later to patch CVE-2026-34242 (reference: Overview).</li>
<li>Implement file integrity monitoring on Weblate servers to detect unauthorized file access (reference: Attack Chain - step 7).</li>
<li>Deploy the Sigma rule to detect ZIP archive downloads containing suspicious filenames that might indicate path traversal attempts (reference: rules).</li>
<li>Educate users about the risks of downloading and extracting files from untrusted sources (reference: Overview).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>weblate</category><category>path-traversal</category><category>zip-archive</category><category>cve-2026-34242</category></item><item><title>Zarf Path Traversal Vulnerability via Malicious Package Metadata.Name</title><link>https://feed.craftedsignal.io/briefs/2026-04-15-zarf-path-traversal/</link><pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-15-zarf-path-traversal/</guid><description>Zarf is vulnerable to path traversal due to insufficient sanitization of the Metadata.Name field in package manifests when using the `zarf package inspect sbom` or `zarf package inspect documentation` commands, potentially leading to arbitrary file write.</description><content:encoded><![CDATA[<p>Zarf, a tool for air-gapped deployments, is susceptible to a path traversal vulnerability (CVE-2026-40090) affecting versions prior to v0.74.2. The vulnerability stems from inadequate sanitization of the <code>Metadata.Name</code> field within Zarf package manifests. When a user employs the <code>zarf package inspect sbom</code> or <code>zarf package inspect documentation</code> commands on an untrusted package, the tool constructs output file paths by concatenating a user-controlled output directory with the package&rsquo;s <code>Metadata.Name</code> field. A malicious actor can craft a Zarf package with a manipulated <code>Metadata.Name</code> containing path traversal sequences (e.g., <code>../../</code>), enabling arbitrary file write capabilities within the permissions of the user running the <code>inspect</code> command. This vulnerability allows attackers to write to locations they control, potentially leading to privilege escalation or system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious Zarf package.</li>
<li>The attacker modifies the <code>zarf.yaml</code> manifest within the package to include a <code>Metadata.Name</code> field containing path traversal sequences (e.g., <code>../../../../tmp/evil</code>).</li>
<li>The attacker repacks the Zarf package, recalculating checksums if necessary.</li>
<li>The attacker distributes the malicious Zarf package.</li>
<li>A victim user downloads the malicious Zarf package.</li>
<li>The victim executes <code>zarf package inspect sbom --output-dir /tmp &lt;malicious-package.tar.zst&gt;</code> or <code>zarf package inspect documentation --output-dir /tmp &lt;malicious-package.tar.zst&gt;</code>.</li>
<li>Zarf extracts the <code>Metadata.Name</code> from the <code>zarf.yaml</code> file.</li>
<li>Zarf constructs an output path by joining the user-specified output directory (/tmp) with the malicious <code>Metadata.Name</code> (<code>../../../../tmp/evil</code>), resulting in <code>/tmp/../../../../tmp/evil</code>. The tool attempts to write the SBOM or documentation data to this path, resulting in writing the file to <code>/tmp/evil</code>. This allows attackers to write files such as SSH authorized keys, cron jobs, or shell profiles.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to write arbitrary files to the file system, limited by the permissions of the user running the <code>zarf package inspect</code> command. This can lead to several critical consequences: privilege escalation by writing to authorized_keys files, arbitrary code execution by writing cron jobs, or persistent compromise by writing to shell profiles. This vulnerability affects users running the <code>zarf package inspect sbom</code> or <code>zarf package inspect documentation</code> command on untrusted packages. The affected packages are go/github.com/zarf-dev/zarf versions &gt;= 0.23.0 and &lt; 0.74.2.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Zarf to version v0.74.2 or later to patch CVE-2026-40090.</li>
<li>Avoid inspecting unsigned Zarf packages as a workaround until the upgrade is complete, as mentioned in the advisory.</li>
<li>Deploy the Sigma rule &ldquo;Detect Zarf Package Inspection with Path Traversal&rdquo; to identify attempts to exploit this vulnerability via command-line arguments.</li>
<li>Monitor file creation events in sensitive directories (e.g., <code>/home/$USER/.ssh</code>, <code>/etc/cron.d</code>) for files created by the zarf binary using the &ldquo;Detect Zarf Arbitrary File Write&rdquo; Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>zarf</category><category>path-traversal</category><category>arbitrary-file-write</category><category>package-inspection</category><category>linux</category></item><item><title>Adobe ColdFusion Path Traversal Vulnerability (CVE-2026-34619)</title><link>https://feed.craftedsignal.io/briefs/2026-04-coldfusion-path-traversal/</link><pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-coldfusion-path-traversal/</guid><description>A path traversal vulnerability (CVE-2026-34619) in Adobe ColdFusion versions 2023.18, 2025.6, and earlier allows an attacker to bypass security features and access unauthorized files or directories without user interaction.</description><content:encoded><![CDATA[<p>CVE-2026-34619 describes a path traversal vulnerability affecting Adobe ColdFusion versions 2023.18, 2025.6, and earlier. Disclosed on April 14, 2026, this vulnerability allows an attacker to bypass intended security restrictions and gain access to sensitive files and directories on the ColdFusion server. The vulnerability exists due to improper limitation of pathnames, and successful exploitation requires no user interaction, making it particularly dangerous. This issue could lead to the exposure of configuration files, source code, or other sensitive data, potentially compromising the entire ColdFusion application and the server it resides on. Organizations using these versions of ColdFusion are vulnerable.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a ColdFusion server running a vulnerable version (2023.18, 2025.6, or earlier).</li>
<li>The attacker crafts a malicious HTTP request containing a path traversal sequence (e.g., &ldquo;../&rdquo;) in a URL parameter that is used to access files.</li>
<li>The ColdFusion server improperly processes the path, failing to adequately restrict access to files within the intended directory.</li>
<li>The attacker bypasses security restrictions and gains access to files or directories outside of the intended web root.</li>
<li>The attacker reads sensitive configuration files, such as database connection strings or API keys.</li>
<li>The attacker leverages exposed credentials to gain unauthorized access to databases or other systems.</li>
<li>The attacker modifies application code or uploads malicious files to further compromise the server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-34619 can lead to a complete compromise of the ColdFusion server. An attacker could steal sensitive data, including customer information, proprietary source code, and database credentials. This could result in significant financial losses, reputational damage, and legal repercussions for affected organizations. The lack of required user interaction makes this vulnerability particularly dangerous, as an attacker can exploit it without any user awareness.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to a patched version of Adobe ColdFusion as soon as possible. Refer to Adobe&rsquo;s security bulletin APSB26-38 for the latest updates and instructions (<a href="https://helpx.adobe.com/security/products/coldfusion/apsb26-38.html)">https://helpx.adobe.com/security/products/coldfusion/apsb26-38.html)</a>.</li>
<li>Implement the Sigma rule &ldquo;Detect ColdFusion Path Traversal Attempts&rdquo; to detect exploitation attempts in web server logs.</li>
<li>Continuously monitor web server logs for suspicious URL patterns and path traversal attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>coldfusion</category><category>cve-2026-34619</category></item><item><title>Fortinet FortiSandbox Path Traversal Vulnerability (CVE-2026-39813)</title><link>https://feed.craftedsignal.io/briefs/2026-04-fortinet-path-traversal/</link><pubDate>Tue, 14 Apr 2026 16:16:45 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-fortinet-path-traversal/</guid><description>A path traversal vulnerability (CVE-2026-39813) in Fortinet FortiSandbox versions 5.0.0 through 5.0.5 and 4.4.0 through 4.4.8 may allow an unauthenticated attacker to escalate privileges via '../filedir'.</description><content:encoded><![CDATA[<p>A path traversal vulnerability, identified as CVE-2026-39813, affects Fortinet FortiSandbox appliances. Specifically, versions 5.0.0 through 5.0.5 and 4.4.0 through 4.4.8 are susceptible. The vulnerability stems from insufficient path validation, potentially allowing an unauthenticated attacker to manipulate file paths and gain elevated privileges on the system. The specific attack vector is not detailed in the source document, but the use of &lsquo;../filedir&rsquo; suggests the possibility of reading or writing arbitrary files. Successful exploitation could lead to complete system compromise, data exfiltration, or denial of service. Defenders should apply available patches or mitigations immediately.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a crafted request to the FortiSandbox appliance.</li>
<li>The request targets a specific endpoint vulnerable to path traversal.</li>
<li>The attacker includes the &ldquo;../filedir&rdquo; sequence within a file path parameter.</li>
<li>The vulnerable application fails to properly sanitize the file path.</li>
<li>The attacker uses path traversal to access sensitive configuration files or system binaries.</li>
<li>By overwriting existing system files, the attacker escalates privileges.</li>
<li>The attacker executes arbitrary commands with elevated privileges.</li>
<li>The attacker gains full control of the FortiSandbox appliance, potentially allowing lateral movement to other systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-39813 allows an unauthenticated attacker to escalate privileges on the Fortinet FortiSandbox appliance. This could lead to complete system compromise, sensitive data exfiltration, or the deployment of malicious payloads. The lack of specific victim numbers or sectors targeted in the source data prevents further quantitative assessment. However, given the appliance&rsquo;s role in network security, a successful attack could severely impact the security posture of organizations using the vulnerable FortiSandbox versions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Fortinet FortiSandbox to a patched version outside the vulnerable range (5.0.0-5.0.5 and 4.4.0-4.4.8) to remediate CVE-2026-39813.</li>
<li>Deploy the Sigma rule &ldquo;Detect Fortinet FortiSandbox Path Traversal Attempt&rdquo; to identify exploitation attempts in web server logs.</li>
<li>Monitor web server logs for suspicious requests containing &ldquo;../filedir&rdquo; patterns.</li>
<li>Investigate any alerts generated by the Sigma rules and review system logs for signs of unauthorized access or privilege escalation.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>path-traversal</category><category>vulnerability</category><category>privilege-escalation</category><category>fortinet</category></item><item><title>UniFi Play Path Traversal Vulnerability (CVE-2026-22562)</title><link>https://feed.craftedsignal.io/briefs/2026-04-unifi-path-traversal/</link><pubDate>Tue, 14 Apr 2026 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-unifi-path-traversal/</guid><description>A path traversal vulnerability in UniFi Play devices allows an attacker with network access to write arbitrary files, leading to remote code execution.</description><content:encoded><![CDATA[<p>CVE-2026-22562 describes a critical path traversal vulnerability affecting UniFi Play PowerAmp (version 1.0.35 and earlier) and UniFi Play Audio Port (version 1.0.24 and earlier) devices. An attacker with access to the UniFi Play network can exploit this vulnerability to write arbitrary files on the file system. This capability can then be leveraged to achieve remote code execution (RCE) on the vulnerable device. Successful exploitation requires network access to the affected UniFi Play devices, making internal networks the primary target. The vulnerability was disclosed in April 2026. Defenders should prioritize patching vulnerable devices to prevent potential compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains access to the UniFi Play network (e.g., via compromised credentials or network intrusion).</li>
<li>Attacker identifies a vulnerable UniFi Play device (PowerAmp &lt;= 1.0.35 or Audio Port &lt;= 1.0.24).</li>
<li>Attacker crafts a malicious HTTP request containing a path traversal sequence (e.g., &ldquo;../../../&rdquo;) in a file upload or download parameter.</li>
<li>The vulnerable device processes the request without proper sanitization, allowing the attacker to write a file to an arbitrary location on the file system.</li>
<li>Attacker writes a malicious script (e.g., a shell script or executable) to a location where it can be executed (e.g., a startup directory or cron job).</li>
<li>Attacker triggers the execution of the malicious script (e.g., by rebooting the device or waiting for the cron job to run).</li>
<li>The malicious script executes with the privileges of the UniFi Play device, granting the attacker remote code execution.</li>
<li>Attacker uses RCE to further compromise the device, pivot to other network assets, or establish persistence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-22562 allows an attacker to gain complete control of the vulnerable UniFi Play device. This can lead to data exfiltration, device disruption, and further compromise of the network to which the device is connected. Given the potential for RCE, an attacker could potentially use compromised devices as entry points to other systems on the network, thus expanding their reach and increasing the overall impact of the attack. Organizations using affected UniFi Play devices are at high risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update UniFi Play PowerAmp to version 1.0.38 or later and UniFi Play Audio Port to version 1.1.9 or later to patch CVE-2026-22562 (see Overview).</li>
<li>Monitor network traffic for suspicious HTTP requests containing path traversal sequences targeting UniFi Play devices using the provided Sigma rule (Path Traversal in URI).</li>
<li>Implement network segmentation to limit the impact of a potential compromise of a UniFi Play device.</li>
<li>Review and harden access controls to the UniFi Play network to prevent unauthorized access by potential attackers.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>path-traversal</category><category>rce</category><category>unifi</category></item><item><title>Helm Plugin Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-helm-path-traversal/</link><pubDate>Sat, 11 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-helm-path-traversal/</guid><description>A path traversal vulnerability in Helm versions 4.0.0 to 4.1.3 allows a malicious plugin to write files to arbitrary locations on the filesystem, leading to potential system compromise.</description><content:encoded><![CDATA[<p>Helm, a package manager for Kubernetes charts, is vulnerable to a path traversal issue. Specifically, Helm versions 4.0.0 through 4.1.3 are affected. A maliciously crafted Helm plugin, when installed or updated, can exploit this vulnerability (CVE-2026-35204) to write the plugin&rsquo;s contents to arbitrary locations on the user&rsquo;s filesystem. This can lead to overwriting critical system files or user data, potentially compromising the system&rsquo;s integrity. Helm v4.1.4 resolves this vulnerability by rejecting plugins with non-SemVer versions containing path traversal patterns. Defenders should ensure Helm installations are updated to the patched version or implement workarounds to validate plugin metadata.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious Helm plugin. This plugin contains a <code>plugin.yaml</code> file with a <code>version</code> field that includes POSIX dot-dot path separators (e.g., <code>/../</code>).</li>
<li>The attacker distributes the malicious plugin to potential victims, possibly through public repositories or direct spear phishing.</li>
<li>A victim attempts to install or update the Helm plugin using the <code>helm plugin install</code> or <code>helm plugin update</code> command.</li>
<li>Helm parses the <code>plugin.yaml</code> file and extracts the <code>version</code> field, which contains the path traversal characters.</li>
<li>Due to the vulnerability, Helm incorrectly resolves the file path, allowing the plugin&rsquo;s contents to be written outside the intended plugin directory.</li>
<li>The malicious plugin overwrites arbitrary files on the user&rsquo;s system based on the path specified in the <code>version</code> field.</li>
<li>Depending on the files overwritten, the attacker can achieve various malicious objectives, such as gaining persistence, escalating privileges, or executing arbitrary code.</li>
<li>The attacker achieves persistence by overwriting system startup scripts or configuration files, allowing the malicious code to run automatically on system reboot.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to overwrite arbitrary files on the victim&rsquo;s system. This can lead to various detrimental outcomes, including data loss, system instability, privilege escalation, and ultimately, complete system compromise. While the specific number of victims is unknown, any user running a vulnerable version of Helm (4.0.0 - 4.1.3) is at risk. The potential impact includes compromising Kubernetes deployments and sensitive data stored on affected systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Helm to version 4.1.4 or later to remediate CVE-2026-35204, as this version includes a patch that prevents path traversal during plugin installation.</li>
<li>Implement a validation step before installing or updating Helm plugins, checking the <code>plugin.yaml</code> file for a <code>version:</code> field containing POSIX dot-dot path separators. This mitigates the risk described in the workaround section of the advisory.</li>
<li>Deploy the Sigma rule &ldquo;Helm Plugin Install with Path Traversal&rdquo; to detect attempts to install plugins with malicious <code>version</code> fields, using file_event logs.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>helm</category><category>path-traversal</category><category>vulnerability</category><category>plugin</category><category>kubernetes</category></item><item><title>Chamilo LMS Path Traversal Vulnerability (CVE-2026-31939)</title><link>https://feed.craftedsignal.io/briefs/2026-04-chamilo-path-trav/</link><pubDate>Sat, 11 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-chamilo-path-trav/</guid><description>A path traversal vulnerability (CVE-2026-31939) in Chamilo LMS versions prior to 1.11.38 allows authenticated attackers to delete arbitrary files via unsanitized user input in the 'test' parameter of savescores.php.</description><content:encoded><![CDATA[<p>Chamilo LMS, a learning management system, is vulnerable to a path traversal vulnerability (CVE-2026-31939) affecting versions prior to 1.11.38. This vulnerability resides in the <code>main/exercise/savescores.php</code> script. The vulnerability arises because the application directly concatenates user-supplied input from the <code>$_REQUEST['test']</code> parameter into a filesystem path without proper sanitization, canonicalization, or traversal checks. This allows an attacker to manipulate the path and potentially delete arbitrary files on the server. Successful exploitation requires an authenticated user with access to the vulnerable functionality. Organizations using affected versions of Chamilo LMS are at risk of data loss and potential system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated user accesses the <code>main/exercise/savescores.php</code> script within the Chamilo LMS application.</li>
<li>The application retrieves the value of the <code>test</code> parameter from the <code>$_REQUEST</code> array.</li>
<li>The application concatenates this user-supplied value directly into a file system path without proper sanitization or validation.</li>
<li>The application then attempts to delete the file specified by the constructed path using a function such as <code>unlink()</code>.</li>
<li>An attacker crafts a malicious <code>test</code> parameter containing path traversal sequences (e.g., <code>../../</code>) to navigate outside the intended directory.</li>
<li>The application, without proper checks, uses the manipulated path to delete a file outside of the designated exercise directory.</li>
<li>The attacker successfully deletes arbitrary files on the server, potentially including sensitive configuration files or other critical data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-31939 allows an attacker to delete arbitrary files on the Chamilo LMS server. This can lead to data loss, system instability, and potential compromise of the entire system. The CVSS v3.1 score of 8.3 (HIGH) reflects the potential for significant impact, with confidentiality, integrity, and availability all being affected. The number of victims depends on the deployment size and user base of the affected Chamilo LMS instances.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Chamilo LMS to version 1.11.38 or later to patch CVE-2026-31939, as indicated in the advisory <a href="https://github.com/chamilo/chamilo-lms/releases/tag/v1.11.38">https://github.com/chamilo/chamilo-lms/releases/tag/v1.11.38</a>.</li>
<li>Implement input validation and sanitization on all user-supplied input, especially the <code>test</code> parameter in <code>main/exercise/savescores.php</code>, to prevent path traversal attacks.</li>
<li>Monitor web server logs for suspicious requests to <code>main/exercise/savescores.php</code> containing path traversal sequences (e.g., <code>../</code>, <code>..\\</code>), using the provided Sigma rule as a guide.</li>
<li>Implement file system access controls to limit the permissions of the web server process to only the necessary directories.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>file-deletion</category><category>chamilo-lms</category></item><item><title>OpenClaw Path Traversal Vulnerability (CVE-2026-35668)</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-path-traversal/</link><pubDate>Fri, 10 Apr 2026 17:17:09 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-path-traversal/</guid><description>OpenClaw before 2026.3.24 is vulnerable to path traversal, allowing sandboxed agents to read arbitrary files from other agents' workspaces via manipulated URL parameters.</description><content:encoded><![CDATA[<p>OpenClaw versions prior to 2026.3.24 are susceptible to a path traversal vulnerability (CVE-2026-35668) that compromises sandbox enforcement. This flaw allows a sandboxed agent to read arbitrary files from another agent&rsquo;s workspace by exploiting weaknesses in the handling of <code>mediaUrl</code> and <code>fileUrl</code> parameters. The vulnerability stems from incomplete parameter validation within the <code>normalizeSandboxMediaParams</code> function and the absence of <code>mediaLocalRoots</code> context, which enables attackers to bypass intended sandbox restrictions and access sensitive data, such as API keys and configuration files, located outside the agent&rsquo;s designated sandbox root. Successful exploitation allows unauthorized data access, potentially leading to lateral movement or data exfiltration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an OpenClaw instance running a version prior to 2026.3.24.</li>
<li>The attacker crafts a malicious request containing either a <code>mediaUrl</code> or <code>fileUrl</code> parameter.</li>
<li>The crafted URL includes path traversal sequences (e.g., <code>../</code>) designed to navigate outside the intended sandbox directory.</li>
<li>The <code>normalizeSandboxMediaParams</code> function processes the URL but fails to adequately sanitize or normalize the path, due to insufficient validation.</li>
<li>The lack of proper <code>mediaLocalRoots</code> context during path resolution further contributes to the bypass.</li>
<li>The application attempts to access the file specified by the manipulated URL.</li>
<li>Due to the path traversal vulnerability, the application reads a file outside the intended sandbox root, potentially revealing sensitive information like API keys.</li>
<li>The attacker retrieves the contents of the targeted file, completing the unauthorized access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-35668 can lead to the disclosure of sensitive information, including API keys and configuration data, stored within other agents&rsquo; workspaces. This unauthorized access can enable attackers to perform lateral movement, escalate privileges, or exfiltrate valuable data. While specific victim counts are unavailable, any OpenClaw deployment running a vulnerable version is at risk. The impact is heightened in environments where OpenClaw agents handle sensitive data or manage critical infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.3.24 or later to remediate CVE-2026-35668 and address the underlying path traversal vulnerability.</li>
<li>Implement input validation and sanitization for all URL parameters, especially those related to file or media access, to prevent path traversal attacks.</li>
<li>Apply the provided Sigma rule to detect suspicious requests containing path traversal sequences in <code>mediaUrl</code> or <code>fileUrl</code> parameters within web server logs.</li>
<li>Review and strengthen sandbox configurations to ensure proper isolation between OpenClaw agents and restrict access to sensitive files.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>vulnerability</category><category>openclaw</category></item><item><title>Perfmatters WordPress Plugin Arbitrary File Overwrite Vulnerability (CVE-2026-4351)</title><link>https://feed.craftedsignal.io/briefs/2026-04-perfmatters-overwrite/</link><pubDate>Fri, 10 Apr 2026 02:37:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-perfmatters-overwrite/</guid><description>The Perfmatters plugin for WordPress is vulnerable to arbitrary file overwrite via path traversal, allowing authenticated attackers with subscriber-level access to overwrite arbitrary files on the server with a fixed PHP docblock content, potentially causing denial of service.</description><content:encoded><![CDATA[<p>The Perfmatters plugin for WordPress, in versions up to and including 2.5.9, is vulnerable to an arbitrary file overwrite vulnerability (CVE-2026-4351). This vulnerability stems from the <code>PMCS::action_handler()</code> method&rsquo;s processing of bulk <code>activate</code>/<code>deactivate</code> actions without proper authorization checks or nonce verification. The unsanitized <code>$_GET['snippets'][]</code> values are then passed to <code>Snippet::activate()</code>/<code>Snippet::deactivate()</code>, which subsequently call <code>Snippet::update()</code> and <code>file_put_contents()</code> with a traversed path. An authenticated attacker with subscriber-level privileges can exploit this flaw to overwrite arbitrary files on the server with a fixed PHP docblock, leading to a potential denial-of-service condition by corrupting critical files such as <code>.htaccess</code> or <code>index.php</code>. This vulnerability allows low-privileged users to gain elevated privileges on the system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the WordPress site with subscriber-level access.</li>
<li>Attacker crafts a malicious HTTP GET request targeting the WordPress installation.</li>
<li>The GET request includes the <code>pmcs_action</code> parameter set to <code>bulk_activate</code> or <code>bulk_deactivate</code>.</li>
<li>The GET request includes the <code>snippets[]</code> parameter containing a path traversal payload, such as <code>../../../.htaccess</code>.</li>
<li>The <code>PMCS::action_handler()</code> function processes the request without proper authorization or nonce validation.</li>
<li>The <code>Snippet::activate()</code> or <code>Snippet::deactivate()</code> functions are called, leading to <code>Snippet::update()</code>.</li>
<li><code>Snippet::update()</code> then calls <code>file_put_contents()</code> with the attacker-controlled path.</li>
<li>The attacker overwrites the targeted file (e.g., <code>.htaccess</code>, <code>index.php</code>) with a fixed PHP docblock, leading to a denial of service or further compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows an attacker to overwrite arbitrary files on the WordPress server. Overwriting critical files like <code>.htaccess</code> or <code>index.php</code> can result in a denial-of-service condition, rendering the website unavailable. In some cases, this could be leveraged for further compromise by injecting malicious code into other PHP files or modifying server configurations. The vulnerability affects all installations using the Perfmatters plugin version 2.5.9 or earlier.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update the Perfmatters plugin to the latest version to patch CVE-2026-4351.</li>
<li>Deploy the Sigma rule <code>Detect Perfmatters Arbitrary File Overwrite Attempt</code> to monitor for exploitation attempts targeting this vulnerability via HTTP GET requests.</li>
<li>Monitor web server logs for suspicious GET requests containing <code>pmcs_action=bulk_activate</code> or <code>pmcs_action=bulk_deactivate</code> and path traversal sequences within the <code>snippets[]</code> parameter.</li>
<li>Implement strict file permission controls to limit the impact of potential file overwrite vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>perfmatters</category><category>file-overwrite</category><category>path-traversal</category></item><item><title>AGiXT Path Traversal Vulnerability (CVE-2026-39981)</title><link>https://feed.craftedsignal.io/briefs/2026-04-agixt-path-traversal/</link><pubDate>Thu, 09 Apr 2026 18:17:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-agixt-path-traversal/</guid><description>AGiXT versions prior to 1.9.2 are vulnerable to path traversal (CVE-2026-39981) due to insufficient validation in the safe_join() function, allowing authenticated attackers to read, write, or delete arbitrary files.</description><content:encoded><![CDATA[<p>AGiXT, a dynamic AI Agent Automation Platform, contains a critical vulnerability (CVE-2026-39981) affecting versions prior to 1.9.2. The vulnerability lies in the <code>safe_join()</code> function within the <code>essential_abilities</code> extension. This function fails to adequately validate file paths, creating an opportunity for authenticated attackers to perform directory traversal attacks. By exploiting this flaw, an attacker can manipulate file paths to access files outside the designated agent workspace, resulting in arbitrary file read, write, or deletion capabilities on the server hosting the AGiXT instance. This issue was addressed and resolved in AGiXT version 1.9.2. This vulnerability could allow an attacker to gain complete control over the AGiXT server.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker authenticates to the AGiXT application.</li>
<li>The attacker crafts a malicious request targeting the <code>safe_join()</code> function within the <code>essential_abilities</code> extension.</li>
<li>The malicious request includes directory traversal sequences (e.g., <code>../</code>) to navigate outside the intended agent workspace.</li>
<li>The <code>safe_join()</code> function fails to properly sanitize the input, allowing the traversal sequences to take effect.</li>
<li>The attacker gains the ability to read arbitrary files on the server using the path traversal.</li>
<li>The attacker exploits the ability to write to arbitrary files to inject malicious code or overwrite existing system files.</li>
<li>The attacker leverages the write access to establish persistence, potentially by modifying system startup scripts or scheduled tasks.</li>
<li>The attacker achieves arbitrary code execution on the server hosting the AGiXT instance, potentially leading to complete system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-39981 can lead to complete compromise of the AGiXT server. An attacker could gain unauthorized access to sensitive data, modify system configurations, install malware, or disrupt services. This vulnerability has a CVSS v3.1 score of 8.8, indicating a high severity. The impact could be significant for organizations relying on AGiXT for critical operations, potentially leading to data breaches, financial losses, and reputational damage. The number of victims and specific sectors targeted are currently unknown.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade AGiXT to version 1.9.2 or later to remediate CVE-2026-39981 (references: <a href="https://github.com/Josh-XT/AGiXT/releases/tag/v1.9.2)">https://github.com/Josh-XT/AGiXT/releases/tag/v1.9.2)</a>.</li>
<li>Implement input validation and sanitization measures to prevent directory traversal attacks.</li>
<li>Monitor AGiXT application logs for suspicious file access attempts and path manipulation sequences.</li>
<li>Deploy the Sigma rules below to your SIEM to detect potential exploitation attempts targeting CVE-2026-39981.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>path-traversal</category><category>cve</category><category>agixt</category><category>web-application</category></item><item><title>Sleuth Kit Path Traversal Vulnerability (CVE-2026-40024)</title><link>https://feed.craftedsignal.io/briefs/2024-01-30-sleuthkit-pathtraversal/</link><pubDate>Wed, 08 Apr 2026 22:16:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-30-sleuthkit-pathtraversal/</guid><description>A path traversal vulnerability exists in The Sleuth Kit through 4.14.0 (tsk_recover), enabling attackers to write files to arbitrary locations via crafted filenames with path traversal sequences in a filesystem image, potentially leading to code execution.</description><content:encoded><![CDATA[<p>The Sleuth Kit, a collection of command-line tools for forensic analysis of disk images, is susceptible to a path traversal vulnerability (CVE-2026-40024) affecting versions up to 4.14.0. This vulnerability resides within the <code>tsk_recover</code> utility, which is designed to recover files from disk images. An attacker can exploit this flaw by crafting a malicious filesystem image containing filenames or directory paths with path traversal sequences (e.g., <code>../</code>). When <code>tsk_recover</code> processes this image, it can be tricked into writing files to arbitrary locations outside the intended recovery directory. Successful exploitation allows attackers to overwrite critical system files, such as shell configuration files or cron entries, ultimately leading to code execution with elevated privileges. This vulnerability poses a significant risk to systems utilizing The Sleuth Kit for forensic investigations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious filesystem image. This image contains filenames or directory paths embedded with path traversal sequences like <code>../</code>.</li>
<li>The attacker, or a user under their control, invokes the <code>tsk_recover</code> utility on a vulnerable system, specifying the malicious filesystem image as input.</li>
<li><code>tsk_recover</code> parses the filesystem image and encounters the crafted filenames with path traversal sequences.</li>
<li>Due to the vulnerability, <code>tsk_recover</code> incorrectly resolves the file paths, allowing the write operation to escape the intended recovery directory.</li>
<li>The utility writes a file to an arbitrary location on the file system. This location is determined by the attacker-controlled path traversal sequences.</li>
<li>The attacker strategically targets critical system files for overwriting, such as shell configuration files (<code>.bashrc</code>, <code>.bash_profile</code>) or cron entries (<code>/etc/cron.d/</code>).</li>
<li>Upon the next user login or scheduled cron job execution, the attacker&rsquo;s malicious code embedded in the overwritten files is executed.</li>
<li>The attacker achieves code execution, potentially gaining persistence or escalating privileges on the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to write arbitrary files to the target system, potentially leading to code execution. By overwriting shell configuration files or cron entries, attackers can gain persistence and escalate their privileges, effectively taking control of the system. While the specific number of victims is unknown, any system utilizing a vulnerable version of The Sleuth Kit for disk image analysis is at risk. The impact could range from data theft to complete system compromise, depending on the attacker&rsquo;s objectives and the level of access gained.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade The Sleuth Kit to a version beyond 4.14.0 to patch CVE-2026-40024 and eliminate the path traversal vulnerability.</li>
<li>Monitor process execution for instances of <code>tsk_recover</code> writing files outside the intended recovery directory using the Sigma rule <code>Detect Sleuth Kit Path Traversal</code>.</li>
<li>Implement file integrity monitoring for critical system files (e.g., <code>.bashrc</code>, <code>.bash_profile</code>, <code>/etc/cron.d/*</code>) to detect unauthorized modifications resulting from exploitation of CVE-2026-40024.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path traversal</category><category>code execution</category><category>privilege escalation</category><category>sleuth kit</category><category>CVE-2026-40024</category></item><item><title>Logstash Arbitrary File Write via Path Traversal (CVE-2026-33466)</title><link>https://feed.craftedsignal.io/briefs/2024-01-24-logstash-path-traversal/</link><pubDate>Wed, 08 Apr 2026 18:26:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-24-logstash-path-traversal/</guid><description>CVE-2026-33466 describes a vulnerability in Logstash where improper validation of file paths within compressed archives allows arbitrary file writes, potentially leading to remote code execution.</description><content:encoded><![CDATA[<p>CVE-2026-33466 exposes a critical vulnerability in Logstash, stemming from improper validation of file paths within compressed archives. This flaw, classified as CWE-22 (Improper Limitation of a Pathname to a Restricted Directory), can be exploited by an attacker to achieve arbitrary file writes on the host system. The attack vector involves serving a specially crafted archive to Logstash, typically through a compromised or attacker-controlled update endpoint. This malicious archive contains file paths designed to traverse directories, allowing the attacker to write files outside of the intended Logstash directories with the privileges of the Logstash process. If Logstash is configured with automatic pipeline reloading, this arbitrary file write can be leveraged to execute arbitrary code, effectively achieving remote code execution (RCE).</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a Logstash instance with a vulnerable version of the archive extraction utility and a potential attack vector via update endpoints.</li>
<li>Attacker crafts a malicious compressed archive containing files with relative path traversal sequences in their filenames (e.g., &ldquo;../../path/to/malicious/file.conf&rdquo;).</li>
<li>Attacker compromises or controls an update endpoint used by Logstash to retrieve updates, such as pipeline configurations or plugins.</li>
<li>Logstash retrieves the malicious archive from the compromised update endpoint.</li>
<li>Logstash extracts the contents of the archive using a vulnerable archive extraction utility.</li>
<li>Due to insufficient path validation, the utility writes the files to arbitrary locations on the filesystem, overwriting existing files or creating new ones. A common target could be Logstash&rsquo;s configuration directory.</li>
<li>If automatic pipeline reloading is enabled, Logstash detects the modified configuration file and reloads the pipeline.</li>
<li>The malicious configuration file contains embedded code that executes arbitrary commands on the system with the privileges of the Logstash process, achieving remote code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33466 can lead to complete compromise of the Logstash server. An attacker can gain arbitrary code execution, allowing them to install malware, steal sensitive data, or disrupt services. The CVSS v3.1 base score of 8.1 reflects the high potential for damage. While the number of potential victims and targeted sectors are unknown, any organization using a vulnerable Logstash instance is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade to a version of Logstash that addresses CVE-2026-33466 as soon as it becomes available.</li>
<li>Implement strict input validation on any update endpoints used by Logstash to prevent the delivery of malicious archives.</li>
<li>Disable automatic pipeline reloading in Logstash if possible, or implement controls to verify the integrity of pipeline configurations before reloading.</li>
<li>Deploy the Sigma rule <code>Detect Logstash Path Traversal Archive Extraction</code> to detect potential exploitation attempts by monitoring for suspicious file creation events.</li>
<li>Monitor file creation events for files created outside of the intended Logstash directories using the <code>Detect Logstash Out-of-Directory File Creation</code> Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>remote-code-execution</category><category>logstash</category></item><item><title>Emmett Web Framework Path Traversal Vulnerability (CVE-2026-39847)</title><link>https://feed.craftedsignal.io/briefs/2026-04-emmett-path-traversal/</link><pubDate>Tue, 07 Apr 2026 22:16:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-emmett-path-traversal/</guid><description>Emmett web framework versions 2.5.0 to before 2.8.1 are vulnerable to path traversal attacks (CVE-2026-39847), allowing attackers to read arbitrary files outside the intended assets directory using manipulated URLs.</description><content:encoded><![CDATA[<p>The Emmett web framework, a full-stack Python framework, is susceptible to a path traversal vulnerability affecting versions 2.5.0 to prior to 2.8.1. Specifically, the RSGI static handler for Emmett&rsquo;s internal assets (/<strong>emmett</strong> paths) does not properly sanitize user-supplied input, leading to CVE-2026-39847. By crafting malicious URLs containing &ldquo;../&rdquo; sequences, an unauthenticated attacker can bypass directory restrictions and access sensitive files residing outside the designated assets directory. Successful exploitation allows attackers to potentially read application source code, configuration files, or other sensitive data. Emmett users are urged to upgrade to version 2.8.1 or later to remediate this vulnerability. The vulnerability was reported on April 7th, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Emmett web application running a version between 2.5.0 and 2.8.1.</li>
<li>The attacker crafts a malicious HTTP GET request targeting a static asset under the <code>/__emmett__</code> path.</li>
<li>The crafted URL includes &ldquo;../&rdquo; sequences to traverse up the directory structure from the intended assets directory. For example: <code>/__emmett__/../../../../etc/passwd</code>.</li>
<li>The web server receives the request and passes it to the vulnerable RSGI static handler.</li>
<li>Due to the lack of input sanitization, the handler processes the &ldquo;../&rdquo; sequences, allowing the attacker to navigate outside the assets directory.</li>
<li>The handler attempts to read the file specified in the manipulated path (e.g., <code>/etc/passwd</code>).</li>
<li>The server returns the contents of the requested file in the HTTP response.</li>
<li>The attacker obtains sensitive information from the server, potentially including configuration files, source code, or credentials.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this path traversal vulnerability (CVE-2026-39847) allows an attacker to read arbitrary files on the server hosting the Emmett web application. This can lead to the exposure of sensitive information such as application source code, configuration files containing database credentials, or even system files. The impact can range from information disclosure to complete compromise of the web application and potentially the underlying server. The severity is rated as critical with a CVSS v3.1 score of 9.1.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Emmett to version 2.8.1 or later to patch CVE-2026-39847.</li>
<li>Deploy the Sigma rule &ldquo;Detect Emmett Path Traversal Attempts&rdquo; to your SIEM to identify exploitation attempts.</li>
<li>Monitor web server logs for suspicious URLs containing &ldquo;../&rdquo; sequences targeting the <code>/__emmett__</code> path to identify potential exploit attempts.</li>
<li>Implement web application firewall (WAF) rules to block requests containing path traversal sequences.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>path-traversal</category><category>web-application</category><category>emmett</category><category>cve-2026-39847</category></item><item><title>ChurchCRM Path Traversal Vulnerability Leading to Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-04-churchcrm-traversal/</link><pubDate>Tue, 07 Apr 2026 18:16:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-churchcrm-traversal/</guid><description>A path traversal vulnerability in ChurchCRM versions prior to 6.5.3 allows authenticated administrators to upload arbitrary files, leading to remote code execution by overwriting Apache .htaccess files.</description><content:encoded><![CDATA[<p>ChurchCRM, an open-source church management system, is vulnerable to a path traversal attack affecting versions prior to 6.5.3. This vulnerability resides in the backup restore functionality, specifically within <code>src/ChurchCRM/Backup/RestoreJob.php</code>. Authenticated administrators can exploit this flaw by manipulating the <code>$rawUploadedFile['name']</code> parameter, which lacks proper sanitization. This allows for the upload of arbitrary files with attacker-controlled names to the <code>/var/www/html/tmp_attach/ChurchCRMBackups/</code> directory. Successful exploitation leads to remote code execution via overwriting Apache&rsquo;s <code>.htaccess</code> configuration files, effectively compromising the web server. Organizations using vulnerable versions of ChurchCRM are at risk of unauthorized access and control of their systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated administrator logs into the ChurchCRM application.</li>
<li>The administrator navigates to the backup restore functionality.</li>
<li>The attacker crafts a malicious backup archive containing a crafted <code>.htaccess</code> file.</li>
<li>The attacker uploads the malicious backup archive via the restore functionality, exploiting the path traversal vulnerability in <code>src/ChurchCRM/Backup/RestoreJob.php</code>. The <code>$rawUploadedFile['name']</code> parameter is manipulated to control the file&rsquo;s destination.</li>
<li>The malicious <code>.htaccess</code> file is written to the web server&rsquo;s document root or a sensitive directory, such as <code>/var/www/html/</code>.</li>
<li>The overwritten <code>.htaccess</code> file modifies the Apache web server&rsquo;s configuration, potentially enabling PHP execution for arbitrary file types or redirecting requests to attacker-controlled scripts.</li>
<li>The attacker accesses a file (e.g., an image or text file) which is now parsed as PHP code due to the malicious <code>.htaccess</code> configuration.</li>
<li>The attacker executes arbitrary code on the server, gaining remote code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to gain complete control of the ChurchCRM web server. This can lead to data breaches, defacement of the website, and the potential to use the compromised server as a launchpad for further attacks within the network. Given the sensitive nature of data often stored in ChurchCRM systems (e.g., personal contact information, financial records), the compromise can have severe consequences for both the organization and its members. While the exact number of vulnerable installations is unknown, the widespread use of ChurchCRM makes this a significant threat.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade ChurchCRM to version 6.5.3 or later to patch the vulnerability described in CVE-2026-35573.</li>
<li>Implement strict file upload validation and sanitization to prevent path traversal vulnerabilities in other web applications.</li>
<li>Monitor web server logs for suspicious file uploads to <code>/var/www/html/tmp_attach/ChurchCRMBackups/</code> directory, looking for unexpected file extensions using the &ldquo;ChurchCRM Suspicious File Upload&rdquo; Sigma rule.</li>
<li>Implement the &ldquo;ChurchCRM .htaccess File Creation&rdquo; Sigma rule to detect the creation of .htaccess files in web directories.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>path-traversal</category><category>rce</category><category>churchcrm</category></item><item><title>text-generation-webui Path Traversal Vulnerability (CVE-2026-35050)</title><link>https://feed.craftedsignal.io/briefs/2026-04-text-generation-webui-path-traversal/</link><pubDate>Mon, 06 Apr 2026 18:16:42 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-text-generation-webui-path-traversal/</guid><description>text-generation-webui versions prior to 4.1.1 are vulnerable to path traversal, allowing a high-privileged user to overwrite Python files and achieve arbitrary code execution by triggering the 'download-model.py' file through the application's 'Model' menu.</description><content:encoded><![CDATA[<p>The text-generation-webui application, an open-source web interface for running Large Language Models, contains a path traversal vulnerability (CVE-2026-35050) in versions prior to 4.1.1. A high-privileged user can exploit this vulnerability by saving extension settings in &ldquo;.py&rdquo; format within the application&rsquo;s root directory. This allows them to overwrite existing Python files, most notably &ldquo;download-model.py&rdquo;. Subsequently, the overwritten &ldquo;download-model.py&rdquo; file can be executed by initiating a new model download through the application&rsquo;s &ldquo;Model&rdquo; menu. Successful exploitation leads to arbitrary code execution within the context of the application. This vulnerability was patched in version 4.1.1.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the text-generation-webui application with high privileges.</li>
<li>Attacker crafts a malicious Python script (e.g., containing reverse shell code).</li>
<li>Attacker saves the malicious script as an extension setting in &ldquo;.py&rdquo; format, leveraging path traversal to target the application&rsquo;s root directory. The filename is chosen to overwrite &ldquo;download-model.py&rdquo;.</li>
<li>The application saves the malicious &ldquo;.py&rdquo; file, overwriting the original &ldquo;download-model.py&rdquo; in the application root.</li>
<li>Attacker navigates to the &ldquo;Model&rdquo; menu within the text-generation-webui.</li>
<li>Attacker initiates the download of a new model, triggering the execution of the (now compromised) &ldquo;download-model.py&rdquo; file.</li>
<li>The malicious Python code within &ldquo;download-model.py&rdquo; executes, granting the attacker arbitrary code execution on the server.</li>
<li>The attacker establishes a reverse shell connection to their controlled system, achieving full system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-35050 allows a high-privileged attacker to achieve arbitrary code execution on the server hosting the text-generation-webui application. This could lead to complete system compromise, data exfiltration, and denial of service. The impact is critical due to the ease of exploitation and the potential for significant damage. Organizations using vulnerable versions of text-generation-webui are at risk of having their systems compromised.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade text-generation-webui to version 4.1.1 or later to patch CVE-2026-35050.</li>
<li>Implement strict file permission controls to prevent unauthorized modification of critical application files, mitigating similar path traversal vulnerabilities.</li>
<li>Monitor web server logs for unusual file creation events in the application root directory to detect potential exploitation attempts (see example Sigma rule below targeting file creation in the webserver category).</li>
<li>Inspect network connections originating from the text-generation-webui server for suspicious outbound connections, which could indicate a reverse shell or other malicious activity resulting from code execution. Deploy the provided Sigma rule to detect such connections.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>path traversal</category><category>code execution</category><category>text-generation-webui</category></item><item><title>prompts.chat Path Traversal Vulnerability (CVE-2026-22661)</title><link>https://feed.craftedsignal.io/briefs/2026-04-prompts-chat-traversal/</link><pubDate>Sat, 04 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-prompts-chat-traversal/</guid><description>A path traversal vulnerability exists in prompts.chat prior to commit 0f8d4c3, allowing attackers to write arbitrary files to the client system by crafting malicious ZIP archives with unsanitized filenames.</description><content:encoded><![CDATA[<p>prompts.chat, a software application, is vulnerable to a path traversal attack (CVE-2026-22661) in versions prior to commit 0f8d4c3. This vulnerability stems from insufficient server-side validation of filenames within skill file archives. A remote attacker can exploit this by crafting malicious ZIP archives that contain filenames with path traversal sequences (e.g., ../). When a vulnerable prompts.chat instance extracts these archives, the lack of proper sanitization allows the attacker to write files to arbitrary locations on the file system, potentially overwriting critical system files and achieving arbitrary code execution. This poses a significant risk to system integrity and confidentiality.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious ZIP archive containing a specially crafted skill file.</li>
<li>The filenames within the ZIP archive include path traversal sequences such as <code>../</code>.</li>
<li>The attacker uploads the malicious ZIP archive to the prompts.chat application.</li>
<li>prompts.chat processes the uploaded ZIP archive without properly sanitizing the filenames.</li>
<li>The application extracts the contents of the ZIP archive, writing files to locations specified in the malicious filenames.</li>
<li>Path traversal sequences in the filenames allow the attacker to write files outside the intended extraction directory.</li>
<li>The attacker overwrites shell initialization files (e.g., <code>.bashrc</code>, <code>.profile</code>, <code>.bash_profile</code>) or other executable files.</li>
<li>When a user logs in or a new shell is spawned, the overwritten initialization file executes malicious code, granting the attacker arbitrary code execution on the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-22661 allows an attacker to write arbitrary files to the client system, leading to potential overwrite of sensitive system files and arbitrary code execution. The vulnerability affects systems running vulnerable versions of prompts.chat. The impact includes complete compromise of the system, data theft, and further propagation of malicious activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch by upgrading to commit 0f8d4c3 or later to remediate CVE-2026-22661.</li>
<li>Implement server-side filename validation and sanitization to prevent path traversal attacks when handling ZIP archives within prompts.chat.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect potential exploitation attempts.</li>
<li>Monitor web server logs for suspicious requests containing path traversal sequences in filenames as identified by the provided rules.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>file-write</category><category>code-execution</category><category>cve-2026-22661</category><category>prompts.chat</category><category>linux</category></item><item><title>goshs Unauthenticated Arbitrary File Deletion via Path Traversal</title><link>https://feed.craftedsignal.io/briefs/2026-04-goshs-path-traversal/</link><pubDate>Sat, 04 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-goshs-path-traversal/</guid><description>The goshs application is vulnerable to unauthenticated path traversal (CVE-2026-35471) due to a missing return statement in the `deleteFile()` function, allowing attackers to delete arbitrary files and directories using a crafted GET request.</description><content:encoded><![CDATA[<p>The goshs application, a simple static file server written in Go, is vulnerable to a path traversal vulnerability (CVE-2026-35471). This flaw exists within the <code>deleteFile</code> function (<code>httpserver/handler.go</code>) due to a missing <code>return</code> statement after a check for path traversal attempts using <code>..</code>. Specifically, if a request contains double-encoded path traversal sequences (e.g., <code>%252e%252e</code>), the check fails to prevent subsequent file deletion. This vulnerability, present in versions prior to 1.1.5-0.20260401172448-237f3af891a9, allows an unauthenticated attacker to delete arbitrary files and directories on the server. The vulnerability affects default configurations of goshs, requiring no authentication or specific flags to be set.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a goshs instance running a vulnerable version (prior to 1.1.5-0.20260401172448-237f3af891a9).</li>
<li>The attacker crafts a GET request to a file path containing double-encoded path traversal sequences (<code>%252e%252e</code>) to bypass the path traversal check in <code>deleteFile()</code>.</li>
<li>The GET request includes the <code>?delete</code> parameter to trigger the file deletion logic.</li>
<li>The <code>deleteFile()</code> function receives the request and decodes the path, but the missing <code>return</code> after the path traversal check allows the execution to continue.</li>
<li>The <code>os.RemoveAll()</code> function is called with the manipulated path, leading to the deletion of arbitrary files or directories outside the intended webroot.</li>
<li>The server responds with HTTP status code 200, even if the file deletion was successful or resulted in an error.</li>
<li>The attacker verifies the deletion of the targeted file/directory.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this path traversal vulnerability allows an unauthenticated attacker to delete any file or directory accessible to the goshs process. This could lead to data loss, system instability, or complete compromise of the server if critical system files are deleted. While the exact number of vulnerable instances is unknown, any organization using goshs versions prior to 1.1.5-0.20260401172448-237f3af891a9 is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to goshs version 1.1.5-0.20260401172448-237f3af891a9 or later to patch CVE-2026-35471.</li>
<li>Deploy the Sigma rule &ldquo;Detect goshs Path Traversal Attempt via URL Encoding&rdquo; to identify ongoing exploitation attempts based on double-encoded path traversal sequences in HTTP requests.</li>
<li>Monitor web server logs for GET requests containing double-encoded &ldquo;..&rdquo; sequences and the &ldquo;?delete&rdquo; parameter, indicative of exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>path-traversal</category><category>file-deletion</category><category>goshs</category></item><item><title>Coder Code-Marketplace Zip Slip Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-06-code-marketplace-zip-slip/</link><pubDate>Sat, 04 Apr 2026 06:29:50 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-06-code-marketplace-zip-slip/</guid><description>A Zip Slip vulnerability in coder/code-marketplace allows authenticated users to upload malicious VSIX files containing path traversal entries, leading to arbitrary file writes outside the extension directory and potentially enabling persistence.</description><content:encoded><![CDATA[<p>A Zip Slip vulnerability (CVE-2026-35454) exists in the Coder code-marketplace application, specifically in versions up to 2.4.1. The vulnerability stems from improper sanitization of zip entry names during VSIX file extraction, which allows an attacker to write files to arbitrary locations on the server. This flaw, discovered by Kandlaguduru Vamsi and detailed in GHSA-8x9r-hvwg-c55h, can be exploited by any authenticated user with upload privileges. Successful exploitation could lead to persistence via cron/init injection, SSH key injection, <code>ld.so.preload</code> hijacking, or binary overwrite. The vulnerability was patched in version 2.4.2. Defenders should upgrade to the latest version of the code-marketplace application to prevent potential exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated user with upload privileges logs into the code-marketplace application.</li>
<li>The attacker crafts a malicious VSIX file containing zip entries with path traversal sequences (e.g., &ldquo;../../../etc/cron.d/evil&rdquo;).</li>
<li>The attacker uploads the malicious VSIX file through the application&rsquo;s extension upload functionality.</li>
<li>The <code>ExtractZip</code> function processes the uploaded VSIX file without proper sanitization of zip entry names.</li>
<li>The <code>filepath.Join</code> function constructs the output path using the unsanitized zip entry name and a base directory.</li>
<li>Path traversal sequences like <code>..</code> are resolved by <code>filepath.Clean</code>, but the resulting path is not checked against the intended base directory, allowing it to escape.</li>
<li>The application writes the extracted file to an attacker-controlled location on the server&rsquo;s file system.</li>
<li>The attacker achieves persistence, privilege escalation, or arbitrary code execution by overwriting critical system files or injecting malicious code into system configurations like cron jobs or SSH authorized keys.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this Zip Slip vulnerability allows attackers to write arbitrary files to the underlying system. An attacker can achieve persistence by injecting malicious cron jobs or modifying system initialization scripts. Privilege escalation is possible via SSH key injection or by overwriting binaries with malicious versions. The impact ranges from system compromise to data exfiltration and denial of service. While the number of victims is unknown, any organization using vulnerable versions of the Coder code-marketplace application is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the coder/code-marketplace application to version 2.4.2 or later to remediate CVE-2026-35454.</li>
<li>Implement file integrity monitoring on critical system directories (e.g., /etc/cron.d, /root/.ssh) using a file_event log source to detect unauthorized file modifications.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious File Creation in Sensitive Directories&rdquo; to detect potential exploitation attempts based on file creation events.</li>
<li>Enable webserver logging and deploy the provided Sigma rule &ldquo;Detect VSIX Uploads with Path Traversal&rdquo; to identify suspicious VSIX uploads containing path traversal sequences based on request parameters.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>zip-slip</category><category>path-traversal</category><category>code-marketplace</category><category>persistence</category></item><item><title>Emlog Path Traversal Vulnerability Leads to Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2024-01-emlog-rce/</link><pubDate>Fri, 03 Apr 2026 23:17:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-emlog-rce/</guid><description>Emlog versions 2.6.2 and prior are vulnerable to path traversal via crafted ZIP uploads, allowing authenticated admins to write arbitrary files and achieve remote code execution.</description><content:encoded><![CDATA[<p>Emlog, an open-source website building system, is vulnerable to a critical path traversal vulnerability (CVE-2026-34607) affecting versions 2.6.2 and earlier. This flaw resides within the <code>emUnZip()</code> function located in <code>include/lib/common.php:793</code>. The vulnerability stems from the function&rsquo;s failure to sanitize ZIP entry names during extraction of ZIP archives, such as those used for plugin/template uploads or backup imports. An authenticated administrator can exploit this by uploading a specially crafted ZIP file containing entries with &ldquo;../&rdquo; sequences. This allows the attacker to write arbitrary files to the server&rsquo;s file system, potentially including PHP webshells, ultimately leading to Remote Code Execution (RCE). At the time of this writing, there are no publicly available patches to address this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker authenticates as an administrator in the Emlog application.</li>
<li>The attacker crafts a malicious ZIP archive containing a file with a path traversal sequence (e.g., <code>../../../../shell.php</code>).</li>
<li>The attacker uploads the crafted ZIP archive via a plugin/template upload or backup import feature.</li>
<li>The <code>emUnZip()</code> function is invoked, which extracts the contents of the ZIP archive.</li>
<li>Due to the lack of sanitization, the <code>extractTo()</code> function writes the malicious file to an arbitrary location on the server&rsquo;s filesystem, as dictated by the path traversal sequence.</li>
<li>The attacker uploads a PHP webshell to a publicly accessible directory.</li>
<li>The attacker accesses the uploaded PHP webshell through a web browser (e.g., <code>http://example.com/shell.php</code>).</li>
<li>The attacker executes arbitrary commands on the server via the webshell, achieving Remote Code Execution (RCE).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to gain complete control over the affected Emlog server. This can lead to data breaches, website defacement, malware distribution, or further attacks against other systems on the network. Given that Emlog is used by numerous websites, the potential impact could be widespread, affecting potentially hundreds or thousands of websites.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates for Emlog as soon as they are released to address CVE-2026-34607.</li>
<li>Implement input validation and sanitization measures within the <code>emUnZip()</code> function to prevent path traversal attacks. Specifically, sanitize ZIP entry names before passing them to the <code>extractTo()</code> function.</li>
<li>Monitor web server logs for suspicious requests to PHP files in unusual directories (e.g., outside the webroot) after ZIP archive uploads, using the provided Sigma rule for webserver logs.</li>
<li>Implement the provided Sigma rule to detect process creation from web server processes to identify potential webshell execution.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>path-traversal</category><category>remote-code-execution</category><category>emlog</category><category>web-application</category></item><item><title>Budibase Path Traversal Vulnerability in Plugin Upload</title><link>https://feed.craftedsignal.io/briefs/2024-05-budibase-traversal/</link><pubDate>Fri, 03 Apr 2026 16:16:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-budibase-traversal/</guid><description>A path traversal vulnerability exists in Budibase versions prior to 3.33.4, allowing attackers with Global Builder privileges to delete arbitrary directories and write arbitrary files via crafted plugin uploads.</description><content:encoded><![CDATA[<p>Budibase, an open-source low-code platform, is vulnerable to a path traversal attack in versions prior to 3.33.4. This flaw resides in the plugin file upload endpoint (POST /api/plugin/upload), where the user-supplied filename is passed unsanitized to createTempFolder(). An attacker with Global Builder privileges can exploit this by crafting a multipart upload containing &ldquo;../&rdquo; sequences in the filename. This allows them to manipulate file paths, leading to arbitrary directory deletion via rmSync and arbitrary file write via tarball extraction. The attacker can write files to any filesystem path accessible by the Node.js process running Budibase. This vulnerability has been patched in version 3.33.4, and organizations using older versions are at risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains Global Builder privileges within a vulnerable Budibase instance (version &lt; 3.33.4).</li>
<li>The attacker crafts a multipart upload request targeting the <code>/api/plugin/upload</code> endpoint (POST request).</li>
<li>Within the multipart form data, the attacker includes a filename parameter.</li>
<li>The filename parameter contains path traversal sequences such as &ldquo;../&rdquo; to manipulate the file path.</li>
<li>The Budibase application passes the unsanitized filename to the <code>createTempFolder()</code> function.</li>
<li>The manipulated path is then used in subsequent file system operations, such as <code>rmSync</code> (for deleting directories) and tarball extraction.</li>
<li>The attacker leverages <code>rmSync</code> with the manipulated path to delete arbitrary directories on the server.</li>
<li>Alternatively, the attacker leverages tarball extraction to write arbitrary files to arbitrary locations on the server, leading to potential code execution or data compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker with Global Builder privileges to perform arbitrary file system operations on the Budibase server. This includes the ability to delete arbitrary directories, potentially causing denial of service, and write arbitrary files, potentially leading to remote code execution. The impact is significant as it could allow for complete system compromise if the attacker can overwrite critical system files or deploy malicious code. This is especially dangerous for organizations relying on Budibase for critical business applications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade Budibase to version 3.33.4 or later to patch the CVE-2026-35214 vulnerability.</li>
<li>Monitor web server logs for POST requests to the <code>/api/plugin/upload</code> endpoint containing filenames with &ldquo;../&rdquo; sequences using the Sigma rule provided.</li>
<li>Implement strict access control policies to limit the number of users with Global Builder privileges within Budibase.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>path-traversal</category><category>vulnerability</category><category>budibase</category></item><item><title>Perfmatters WordPress Plugin Arbitrary File Deletion Vulnerability (CVE-2026-4350)</title><link>https://feed.craftedsignal.io/briefs/2026-04-perfmatters-file-deletion/</link><pubDate>Fri, 03 Apr 2026 08:16:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-perfmatters-file-deletion/</guid><description>The Perfmatters plugin for WordPress versions up to 2.5.9.1 is vulnerable to arbitrary file deletion via path traversal, allowing authenticated attackers with minimal privileges to delete sensitive files.</description><content:encoded><![CDATA[<p>The Perfmatters plugin, a popular WordPress performance optimization tool, contains a critical vulnerability (CVE-2026-4350) affecting versions up to and including 2.5.9.1. This flaw enables authenticated attackers with Subscriber-level access, the lowest privilege level in WordPress, to delete arbitrary files on the server. The vulnerability stems from the <code>PMCS::action_handler()</code> method&rsquo;s failure to sanitize the <code>$_GET['delete']</code> parameter. This lack of validation allows for path traversal attacks using sequences like <code>../</code>, enabling attackers to navigate outside the intended storage directory and delete any accessible file. Successful exploitation can lead to the deletion of critical files such as <code>wp-config.php</code>, effectively disabling the website and potentially allowing a full site takeover.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a WordPress site using a vulnerable version (&lt;=2.5.9.1) of the Perfmatters plugin.</li>
<li>Attacker gains Subscriber-level access to the WordPress site. This can be achieved through registration or compromised credentials.</li>
<li>Attacker crafts a malicious HTTP GET request targeting the WordPress site. The request includes the <code>delete</code> parameter with a path traversal payload. For example: <code>?delete=../../../../wp-config.php</code>.</li>
<li>The request is sent to the <code>PMCS::action_handler()</code> method within the Perfmatters plugin.</li>
<li>The <code>PMCS::action_handler()</code> method processes the unsanitized <code>$_GET['delete']</code> parameter.</li>
<li>The plugin concatenates the malicious path with the storage directory.</li>
<li>The <code>unlink()</code> function executes, deleting the file specified by the attacker&rsquo;s path traversal payload.</li>
<li>If the attacker successfully deletes <code>wp-config.php</code>, the WordPress site becomes inaccessible and redirects to the installation wizard, potentially allowing for complete site takeover.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-4350 allows attackers to delete arbitrary files on a vulnerable WordPress server. A key target is <code>wp-config.php</code>, which contains sensitive database credentials. Deleting this file forces WordPress into the installation wizard, potentially leading to a full site takeover. The impact ranges from defacement and data loss to complete control of the website, impacting businesses, organizations, and individuals relying on WordPress for their online presence. The ease of exploitation due to the low privilege requirements makes this a high-risk vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update the Perfmatters plugin to the latest version to patch CVE-2026-4350.</li>
<li>Implement the provided Sigma rule <code>Detect Perfmatters Arbitrary File Deletion Attempt</code> to identify potential exploitation attempts based on <code>cs-uri-query</code> in web server logs.</li>
<li>Consider implementing rate limiting on requests to <code>wp-admin/options.php</code> to mitigate potential brute-force exploitation attempts targeting this vulnerability.</li>
<li>Review web server access logs for unusual patterns in <code>cs-uri-query</code> parameters containing <code>../</code> sequences, as these may indicate path traversal attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-4350</category><category>wordpress</category><category>perfmatters</category><category>file-deletion</category><category>path-traversal</category></item><item><title>Endian Firewall Arbitrary File Deletion via Path Traversal (CVE-2026-34790)</title><link>https://feed.craftedsignal.io/briefs/2026-04-endian-traversal/</link><pubDate>Thu, 02 Apr 2026 15:16:42 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-endian-traversal/</guid><description>Endian Firewall versions 3.3.25 and prior allow authenticated users to delete arbitrary files due to a path traversal vulnerability in the `remove ARCHIVE` parameter of the `/cgi-bin/backup.cgi` script, leading to unauthorized file system modification.</description><content:encoded><![CDATA[<p>Endian Firewall, a security-focused Linux distribution designed for gateway security, is vulnerable to a path traversal attack. Specifically, versions 3.3.25 and earlier are affected by CVE-2026-34790. An authenticated user, with low-level privileges, can exploit this vulnerability to delete arbitrary files on the system. The flaw resides in the <code>/cgi-bin/backup.cgi</code> script where the <code>remove ARCHIVE</code> parameter is not properly sanitized. This allows an attacker to inject directory traversal sequences (e.g., <code>../</code>) into the file path, bypassing intended restrictions. This can lead to deletion of sensitive files, potentially disrupting system operations or facilitating further malicious activities. The vulnerability was reported in April 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the Endian Firewall web interface.</li>
<li>The attacker crafts a malicious HTTP request targeting <code>/cgi-bin/backup.cgi</code>.</li>
<li>The request includes the <code>remove ARCHIVE</code> parameter with a payload containing directory traversal sequences (e.g., <code>../../../../etc/shadow</code>).</li>
<li>The <code>/cgi-bin/backup.cgi</code> script receives the request and constructs a file path using the unsanitized <code>remove ARCHIVE</code> parameter.</li>
<li>The script calls the <code>unlink()</code> function with the attacker-controlled file path.</li>
<li>The <code>unlink()</code> function deletes the file specified by the manipulated path.</li>
<li>The attacker repeats this process to delete other critical system files.</li>
<li>This can lead to a denial-of-service condition, data loss, or the potential for further system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to delete arbitrary files on the Endian Firewall system. This can result in a denial-of-service (DoS) condition if critical system files are removed. An attacker may target configuration files, logs, or even binaries, leading to system instability or the disabling of security features. The number of potential victims is dependent on the number of Endian Firewall deployments running vulnerable versions (3.3.25 and prior). Given that Endian Firewall is often used in small to medium-sized businesses, the impact could range from disruption of network services to potential data breaches, depending on the specific files targeted.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or upgrade to a version of Endian Firewall that addresses CVE-2026-34790 to remediate the vulnerability.</li>
<li>Monitor web server logs for requests to <code>/cgi-bin/backup.cgi</code> containing directory traversal sequences (e.g., <code>../</code>, <code>..\\</code>) in the <code>remove ARCHIVE</code> parameter using the provided Sigma rule &ldquo;Detect Endian Firewall Path Traversal Attempt&rdquo;.</li>
<li>Implement input validation and sanitization on all user-supplied input, especially within CGI scripts like <code>/cgi-bin/backup.cgi</code>, to prevent path traversal attacks.</li>
<li>Restrict access to the Endian Firewall web interface to trusted networks or users and enforce strong authentication measures.</li>
<li>Regularly back up the Endian Firewall configuration and critical system files to mitigate the impact of potential data loss due to successful exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>path-traversal</category><category>file-deletion</category><category>web-application</category></item><item><title>SillyTavern Path Traversal Vulnerability in Chat Endpoints</title><link>https://feed.craftedsignal.io/briefs/2026-04-sillytavern-path-traversal/</link><pubDate>Thu, 02 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-sillytavern-path-traversal/</guid><description>A path traversal vulnerability in SillyTavern versions 1.16.0 and earlier allows an authenticated attacker to read and delete arbitrary files under their user data root by manipulating the avatar_url parameter in the `/api/chats/export` and `/api/chats/delete` endpoints.</description><content:encoded><![CDATA[<p>SillyTavern, a local web UI for large language models, is vulnerable to a path traversal attack. This vulnerability, affecting versions 1.16.0 and earlier, stems from insufficient input validation in the <code>avatar_url</code> parameter of the <code>/api/chats/export</code> and <code>/api/chats/delete</code> endpoints. An authenticated attacker can exploit this flaw to read or delete arbitrary files within the user&rsquo;s data directory. The vulnerability exists because the application fails to adequately sanitize path traversal sequences like <code>..</code> when constructing file paths. This can lead to the exposure of sensitive information such as <code>secrets.json</code> and <code>settings.json</code>, or the deletion of crucial user data, particularly in multi-user or remotely-accessible deployments. The vulnerability was patched in version 1.17.0 and assigned CVE-2026-34524.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker authenticates to the SillyTavern application using valid credentials, obtaining a session cookie and CSRF token.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/api/chats/export</code> or <code>/api/chats/delete</code> endpoint.</li>
<li>The attacker sets the <code>avatar_url</code> parameter in the request body to a path traversal sequence, such as <code>..</code>, to navigate outside the intended &ldquo;chats&rdquo; directory.</li>
<li>In the <code>/api/chats/export</code> endpoint, the attacker specifies the <code>file</code> parameter to point to the desired file to read, such as <code>secrets.json</code>.</li>
<li>The server-side application uses <code>path.join</code> to concatenate the user&rsquo;s chats directory with the attacker-controlled <code>avatar_url</code> and <code>file</code> parameters, resulting in path traversal.</li>
<li>The application reads the contents of the file specified by the attacker.</li>
<li>In the <code>/api/chats/delete</code> endpoint, the attacker specifies the <code>chatfile</code> parameter to point to the desired file to delete, such as <code>settings.json</code>.</li>
<li>The application deletes the file specified by the attacker.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can have significant consequences. Attackers can gain unauthorized access to sensitive configuration files like <code>secrets.json</code>, potentially exposing API keys, passwords, and other confidential information. Furthermore, the ability to delete arbitrary files allows attackers to disrupt the application&rsquo;s functionality or even render a user&rsquo;s account unusable by deleting critical files such as <code>settings.json</code>. The risk is amplified in multi-user environments or remotely-accessible deployments, where the impact can extend to multiple users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to SillyTavern version 1.17.0 or later to patch CVE-2026-34524.</li>
<li>Deploy the Sigma rule &ldquo;Detect SillyTavern Path Traversal Attempt via API Export&rdquo; to detect attempts to exploit the <code>/api/chats/export</code> endpoint by monitoring for path traversal sequences in the <code>cs-uri-query</code> field.</li>
<li>Deploy the Sigma rule &ldquo;Detect SillyTavern Path Traversal Attempt via API Delete&rdquo; to detect attempts to exploit the <code>/api/chats/delete</code> endpoint by monitoring for path traversal sequences in the <code>cs-uri-query</code> field.</li>
<li>Review web server access logs for unusual requests to <code>/api/chats/export</code> or <code>/api/chats/delete</code> with suspicious <code>avatar_url</code> parameters.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>web-application</category><category>sillytavern</category></item><item><title>Tina CMS Path Traversal Vulnerability (CVE-2026-34603)</title><link>https://feed.craftedsignal.io/briefs/2026-04-tina-cms-path-traversal/</link><pubDate>Wed, 01 Apr 2026 17:28:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tina-cms-path-traversal/</guid><description>Tina CMS versions before 2.2.2 are vulnerable to a path traversal attack that allows unauthorized file system access due to insufficient validation of symlinks and junction targets in media routes.</description><content:encoded><![CDATA[<p>Tina CMS, a headless content management system, is susceptible to a path traversal vulnerability in versions prior to 2.2.2. The vulnerability, identified as CVE-2026-34603, stems from insufficient validation of symlink and junction targets within the <code>@tinacms/cli</code> media routes. Although lexical path-traversal checks were implemented, they only validate the path string without resolving symlinks or junctions. This flaw enables attackers to bypass intended security measures and perform unauthorized file system operations, potentially leading to sensitive data exposure or system compromise. This vulnerability has been addressed in version 2.2.2. Defenders should prioritize upgrading to the patched version to mitigate the risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a Tina CMS instance running a version prior to 2.2.2.</li>
<li>Attacker crafts a malicious HTTP request targeting a media route.</li>
<li>The crafted request includes a path containing a symlink or junction pointing outside the intended media root directory (e.g., <code>pivot/written-from-media.txt</code>).</li>
<li>Tina CMS validates the path string but fails to resolve the symlink or junction.</li>
<li>The application incorrectly determines that the path is within the allowed media directory.</li>
<li>The application performs file system operations (listing, writing, or deleting) based on the attacker-supplied path.</li>
<li>The file system operation is executed outside the intended media root due to the resolved symlink or junction.</li>
<li>Attacker gains unauthorized access to sensitive files or directories, potentially leading to data exfiltration, modification, or deletion.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-34603 can lead to unauthorized access to sensitive files and directories on the server hosting Tina CMS. An attacker could list, read, write, or delete files outside the intended media root, potentially leading to data exfiltration, website defacement, or even complete system compromise. The impact is particularly significant if the affected server stores sensitive information or is critical to business operations. The number of potential victims is currently unknown, but any organization using vulnerable versions of Tina CMS is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Tina CMS to version 2.2.2 or later to patch CVE-2026-34603.</li>
<li>Implement web application firewall (WAF) rules to detect and block suspicious requests containing path traversal sequences targeting media routes.</li>
<li>Monitor web server access logs for unusual file access patterns and path traversal attempts. Deploy the provided Sigma rule to detect potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>tina-cms</category><category>CVE-2026-34603</category></item><item><title>Sanster IOPaint Path Traversal Vulnerability (CVE-2026-5258)</title><link>https://feed.craftedsignal.io/briefs/2026-04-iopaint-path-traversal/</link><pubDate>Wed, 01 Apr 2026 07:16:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-iopaint-path-traversal/</guid><description>A path traversal vulnerability (CVE-2026-5258) exists in Sanster IOPaint 1.5.3, allowing remote attackers to read arbitrary files by manipulating the filename argument in the _get_file function within the File Manager component.</description><content:encoded><![CDATA[<p>Sanster IOPaint version 1.5.3 is vulnerable to a path traversal flaw (CVE-2026-5258) within its File Manager component. The vulnerability resides in the <code>_get_file</code> function located in <code>iopaint/file_manager/file_manager.py</code>. By crafting a malicious request and manipulating the <code>filename</code> argument, an unauthenticated attacker can bypass directory restrictions and potentially read sensitive files on the server. Publicly available exploits exist, increasing the urgency for patching or mitigating this vulnerability. The vendor was notified but did not respond.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a Sanster IOPaint 1.5.3 instance running a vulnerable server.</li>
<li>The attacker crafts a malicious HTTP request targeting the file retrieval endpoint of the <code>File Manager</code> component.</li>
<li>Within the request, the attacker manipulates the <code>filename</code> parameter to include path traversal sequences (e.g., <code>../</code>, <code>..%2f</code>).</li>
<li>The server-side application, specifically the <code>_get_file</code> function in <code>iopaint/file_manager/file_manager.py</code>, receives the request with the tainted <code>filename</code>.</li>
<li>Due to insufficient input validation and sanitization, the application incorrectly constructs the file path.</li>
<li>The application attempts to read a file from a location outside the intended directory, based on the attacker-controlled path.</li>
<li>If successful, the application returns the contents of the arbitrary file in the HTTP response.</li>
<li>The attacker receives the content of the targeted file, potentially containing sensitive information or configuration data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this path traversal vulnerability (CVE-2026-5258) allows an attacker to read arbitrary files on the server hosting Sanster IOPaint. This can lead to the disclosure of sensitive information, such as application source code, configuration files containing database credentials, or user data. The impact depends on the permissions of the user account running the application. If the application runs with elevated privileges, the attacker may be able to access system-level files, potentially leading to further compromise of the server.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect IOPaint Path Traversal Attempt</code> to detect exploitation attempts based on suspicious URL encoding in web server logs.</li>
<li>Implement strict input validation and sanitization on the <code>filename</code> parameter within the <code>_get_file</code> function to prevent path traversal attacks as described in CVE-2026-5258.</li>
<li>Consider using a web application firewall (WAF) with rules designed to block path traversal attempts.</li>
<li>Upgrade to a patched version of Sanster IOPaint as soon as one becomes available to remediate CVE-2026-5258.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path traversal</category><category>cve-2026-5258</category><category>web application</category></item><item><title>DELMIA Factory Resource Manager Path Traversal Vulnerability (CVE-2025-10559)</title><link>https://feed.craftedsignal.io/briefs/2026-03-delmia-path-traversal/</link><pubDate>Tue, 31 Mar 2026 09:16:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-delmia-path-traversal/</guid><description>CVE-2025-10559 is a path traversal vulnerability in DELMIA Factory Resource Manager, affecting versions 3DEXPERIENCE R2023x through R2025x, which allows an attacker with low privileges to read or write files in specific directories on the server, potentially leading to information disclosure or code execution.</description><content:encoded>&lt;p>CVE-2025-10559 is a critical path traversal vulnerability found in the DELMIA Factory Resource Manager, impacting versions from 3DEXPERIENCE R2023x to R2025x. This vulnerability allows an attacker with low-level privileges (authenticated user) to manipulate file paths and potentially read or write arbitrary files within specific directories on the server. This can be exploited to read sensitive configuration files, overwrite critical system files, or potentially achieve remote code execution…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>vulnerability</category><category>delmia</category><category>cve-2025-10559</category></item><item><title>SciTokens Library Path Traversal Vulnerability (CVE-2026-32727)</title><link>https://feed.craftedsignal.io/briefs/2024-01-23-scitokens-path-traversal/</link><pubDate>Tue, 31 Mar 2026 03:15:57 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-23-scitokens-path-traversal/</guid><description>A path traversal vulnerability (CVE-2026-32727) in SciTokens library versions prior to 1.9.7 allows attackers to bypass intended directory restrictions using dot-dot sequences in the scope claim of a token due to improper path normalization.</description><content:encoded><![CDATA[<p>The SciTokens library, a reference implementation for generating and using SciTokens, is susceptible to a path traversal vulnerability affecting versions prior to 1.9.7. This vulnerability, identified as CVE-2026-32727, stems from the library&rsquo;s Enforcer component. An attacker can exploit this flaw by crafting a malicious token containing a scope claim with &ldquo;dot-dot&rdquo; (..) sequences. These sequences allow the attacker to navigate outside the intended directory restriction, potentially accessing…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>scitokens</category><category>path-traversal</category><category>cve-2026-32727</category><category>vulnerability</category></item><item><title>TinaCMS GraphQL Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tinacms-path-traversal/</link><pubDate>Mon, 30 Mar 2026 17:11:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tinacms-path-traversal/</guid><description>A path traversal vulnerability in @tinacms/graphql allows unauthenticated users to write and overwrite arbitrary files within the project root by manipulating the relativePath parameter in GraphQL mutations, leading to potential arbitrary code execution.</description><content:encoded><![CDATA[<p>A path traversal vulnerability has been identified in versions 2.2.1 and earlier of <code>@tinacms/graphql</code>, a GraphQL API for TinaCMS. This flaw enables unauthenticated attackers to write and overwrite arbitrary files within the project root directory. The vulnerability stems from insufficient validation of the <code>relativePath</code> parameter within GraphQL mutations. By exploiting this weakness, attackers can overwrite critical server configuration files like <code>package.json</code> and <code>tsconfig.json</code>, inject malicious scripts into the <code>public/</code> directory, and even achieve arbitrary code execution by modifying build scripts or server-side logic files. This vulnerability poses a significant risk to systems utilizing vulnerable versions of <code>@tinacms/graphql</code>.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a TinaCMS instance running a vulnerable version of <code>@tinacms/graphql</code> (&lt;= 2.2.1).</li>
<li>The attacker crafts a malicious GraphQL mutation request targeting the <code>updateDocument</code> mutation.</li>
<li>Within the mutation, the attacker manipulates the <code>relativePath</code> parameter to include a path traversal sequence, such as <code>x\\\\..\\\\..\\\\..\\\\package.json</code>. The backslashes are misinterpreted on non-Windows systems.</li>
<li>The vulnerable <code>getValidatedPath</code> function fails to properly sanitize the malicious path due to the backslash bypass on non-Windows platforms.</li>
<li>The request is processed, and the server attempts to write to the attacker-specified file path.</li>
<li>The file system API resolves the path traversal sequence, leading to a write operation outside the intended directory.</li>
<li>The attacker overwrites a critical file, such as <code>package.json</code>, with malicious content.</li>
<li>The server or build process executes the modified file, resulting in arbitrary code execution or other malicious behavior.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthenticated attackers to perform arbitrary file writes, leading to several critical consequences. Attackers can overwrite server configuration files, inject malicious scripts for client-side attacks, and achieve arbitrary code execution by modifying build scripts or server-side logic. The impact ranges from denial of service to complete system compromise. While the exact number of affected systems is unknown, all TinaCMS instances running <code>@tinacms/graphql</code> version 2.2.1 or earlier are susceptible.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade <code>@tinacms/graphql</code> to a patched version (later than 2.2.1) to remediate CVE-2026-33949.</li>
<li>Deploy the Sigma rule <code>Detect TinaCMS GraphQL Path Traversal Attempt</code> to identify attempted exploitation of the vulnerability.</li>
<li>Monitor web server logs for POST requests to the <code>/graphql</code> endpoint containing suspicious <code>relativePath</code> parameters.</li>
<li>Implement strict input validation and sanitization for file paths within GraphQL mutations, regardless of the underlying operating system.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>graphql</category><category>tinacms</category><category>arbitrary-file-write</category></item><item><title>CVE-2026-2328 Unauthenticated Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-path-traversal/</link><pubDate>Mon, 30 Mar 2026 08:16:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-path-traversal/</guid><description>CVE-2026-2328 describes a vulnerability where an unauthenticated remote attacker can exploit insufficient input validation to access backend components beyond their intended scope via path traversal, leading to the exposure of sensitive information.</description><content:encoded>&lt;p>CVE-2026-2328 is a critical vulnerability that allows an unauthenticated remote attacker to perform path traversal attacks due to insufficient input validation. This flaw enables unauthorized access to backend components, potentially exposing sensitive information. The vulnerability was published on March 30, 2026, and assigned a CVSS v3.1 score of 7.5. The vulnerability stems from inadequate input sanitization, permitting attackers to manipulate file paths and access restricted areas of the…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>vulnerability</category><category>webserver</category></item><item><title>LangChain Core Path Traversal Vulnerability in Legacy APIs</title><link>https://feed.craftedsignal.io/briefs/2026-03-langchain-path-traversal/</link><pubDate>Sat, 28 Mar 2026 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-langchain-path-traversal/</guid><description>A path traversal vulnerability in LangChain Core's legacy `load_prompt` functions allows attackers to read arbitrary files by injecting malicious paths into prompt configurations.</description><content:encoded><![CDATA[<p>Multiple path traversal vulnerabilities have been identified within the <code>langchain-core</code> package, specifically affecting the legacy <code>load_prompt</code>, <code>load_prompt_from_config</code>, and <code>.save()</code> methods. These vulnerabilities stem from a lack of validation on file paths embedded within deserialized configuration dictionaries. An attacker who can influence or control the prompt configuration supplied to these functions can exploit this flaw to read arbitrary files on the host filesystem. The scope is constrained by file extension checks, limiting readable files to <code>.txt</code> for templates and <code>.json</code> or <code>.yaml</code> for examples. This issue impacts applications that accept prompt configurations from untrusted sources, such as low-code AI builders and API wrappers exposing <code>load_prompt_from_config()</code>. The vulnerable code resides within <code>langchain_core/prompts/loading.py</code> in the <code>_load_template()</code>, <code>_load_examples()</code>, and <code>_load_few_shot_prompt()</code> functions. This vulnerability is resolved in <code>langchain-core</code> version 1.2.22, and the affected functions are now deprecated.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an application using the vulnerable <code>langchain-core</code> library and the legacy <code>load_prompt_from_config()</code> function.</li>
<li>Attacker crafts a malicious prompt configuration dictionary containing a <code>template_path</code>, <code>suffix_path</code>, <code>prefix_path</code>, <code>examples</code>, or <code>example_prompt_path</code> key with a path traversal sequence (e.g., <code>../../etc/passwd</code>) or an absolute path (e.g., <code>/etc/passwd</code>).</li>
<li>The attacker injects the malicious configuration into the application, potentially via a low-code AI builder or an API endpoint that accepts prompt configurations.</li>
<li>The application deserializes the malicious configuration dictionary and passes it to <code>load_prompt_from_config()</code>.</li>
<li><code>load_prompt_from_config()</code> calls the relevant vulnerable function (<code>_load_template()</code>, <code>_load_examples()</code>, or <code>_load_few_shot_prompt()</code>) based on the configuration.</li>
<li>The vulnerable function reads the file specified in the malicious path without proper validation.</li>
<li>The contents of the file are then incorporated into a prompt object.</li>
<li>The application, believing the prompt is benign, processes it further, potentially disclosing the file contents to the attacker via an error message, logging, or other output channels.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows an attacker to read arbitrary files on the system, potentially exposing sensitive information. This includes cloud-mounted secrets (e.g., <code>/mnt/secrets/api_key.txt</code>), configuration files (e.g., <code>requirements.txt</code>), cloud credentials (e.g., <code>~/.docker/config.json</code>), Kubernetes manifests, CI/CD configurations, and application settings. The impact is especially severe in applications that handle sensitive data or operate in cloud environments. While no victim numbers are available, any application using the vulnerable <code>langchain-core</code> versions is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade <code>langchain-core</code> to version 1.2.22 or later to patch CVE-2026-34070.</li>
<li>Migrate away from the deprecated <code>load_prompt</code>, <code>load_prompt_from_config</code>, and <code>.save()</code> methods in favor of the <code>dumpd</code>/<code>dumps</code>/<code>load</code>/<code>loads</code> serialization APIs in <code>langchain_core.load</code>.</li>
<li>If you cannot immediately upgrade, sanitize user-supplied prompt configurations to prevent path traversal by rejecting absolute paths and paths containing <code>..</code> sequences.</li>
<li>Deploy the Sigma rule &ldquo;LangChain Path Traversal Attempt&rdquo; to detect attempts to exploit this vulnerability by monitoring process creations involving <code>python</code> and path traversal sequences in command line arguments.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>langchain</category><category>path-traversal</category><category>vulnerability</category></item><item><title>@mobilenext/mobile-mcp Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-04-mobile-mcp-path-traversal/</link><pubDate>Fri, 27 Mar 2026 19:13:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-04-mobile-mcp-path-traversal/</guid><description>The @mobilenext/mobile-mcp package before version 0.0.49 is vulnerable to a Path Traversal vulnerability in the mobile_save_screenshot and mobile_start_screen_recording tools where the `saveTo` and `output` parameters are passed directly to filesystem operations without validation, potentially allowing an attacker to write files outside the intended workspace, leading to privilege escalation and persistence by overwriting sensitive host files.</description><content:encoded><![CDATA[<p>The <code>@mobilenext/mobile-mcp</code> npm package, versions prior to 0.0.49, contains a critical path traversal vulnerability. This flaw stems from the <code>mobile_save_screenshot</code> and <code>mobile_start_screen_recording</code> tools which improperly handle user-supplied paths. Specifically, the <code>saveTo</code> parameter in <code>mobile_save_screenshot</code> and the <code>output</code> parameter in <code>mobile_start_screen_recording</code> are passed directly to filesystem write operations without adequate validation. This oversight enables a malicious actor to write arbitrary files to locations outside of the intended workspace. A successful exploit of this vulnerability allows for the potential overwriting of sensitive system files, enabling privilege escalation and persistence on the host system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains control over the <code>saveTo</code> or <code>output</code> parameter of the vulnerable functions. This could be achieved through a malicious application, supply chain attack, or other means of code injection.</li>
<li>The attacker crafts a path containing traversal sequences (e.g., <code>../</code>) designed to navigate outside of the intended save directory.</li>
<li>The attacker calls the <code>mobile_save_screenshot</code> or <code>mobile_start_screen_recording</code> tool with the manipulated path as the <code>saveTo</code> or <code>output</code> parameter, respectively.</li>
<li>The vulnerable function passes the attacker-controlled path to <code>fs.writeFileSync()</code> without validation.</li>
<li><code>fs.writeFileSync()</code> writes the screenshot or screen recording data to the attacker-specified path.</li>
<li>If the path leads to a sensitive system file (e.g., <code>~/.bashrc</code>, <code>~/.ssh/authorized_keys</code>), it is overwritten with the contents of the screenshot or screen recording.</li>
<li>The attacker can overwrite configuration files or executables in order to achieve code execution.</li>
<li>The attacker achieves persistence and/or elevated privileges on the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this path traversal vulnerability can have severe consequences. An attacker can overwrite critical system files, such as shell configuration files (<code>.bashrc</code>, <code>.zshrc</code>), SSH authorized keys (<code>.ssh/authorized_keys</code>), or application configuration files. This can lead to arbitrary code execution, privilege escalation, and persistent backdoor access to the affected system. The reported impact includes potential for a broken shell and unauthorized access. All users of <code>@mobilenext/mobile-mcp</code> versions prior to 0.0.49 are vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to <code>@mobilenext/mobile-mcp</code> version 0.0.49 or later to remediate the vulnerability.</li>
<li>Implement robust input validation for all file paths used in file system operations. Specifically, validate the <code>saveTo</code> and <code>output</code> parameters of the <code>mobile_save_screenshot</code> and <code>mobile_start_screen_recording</code> functions.</li>
<li>Deploy the Sigma rule &ldquo;Detect Mobile-MCP Path Traversal Attempts&rdquo; to your SIEM to detect attempts to exploit this vulnerability.</li>
<li>Monitor application logs for unusual file access patterns or attempts to write to sensitive system directories.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>file-write</category><category>privilege-escalation</category><category>persistence</category></item><item><title>Path Traversal Vulnerability in API File Upload Endpoint (CVE-2026-5027)</title><link>https://feed.craftedsignal.io/briefs/2026-03-path-traversal-api/</link><pubDate>Fri, 27 Mar 2026 15:17:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-path-traversal-api/</guid><description>The 'POST /api/v2/files' endpoint is vulnerable to path traversal due to improper sanitization of the 'filename' parameter, potentially allowing attackers to write files to arbitrary locations on the filesystem and achieve remote code execution.</description><content:encoded><![CDATA[<p>CVE-2026-5027 exposes a critical vulnerability in the &lsquo;POST /api/v2/files&rsquo; endpoint, where the &lsquo;filename&rsquo; parameter within multipart form data is not properly sanitized. This flaw allows an attacker to manipulate the filename by injecting path traversal sequences such as &lsquo;../&rsquo;, leading to the ability to write files to arbitrary locations on the server&rsquo;s filesystem. This vulnerability was reported by Tenable Network Security, Inc. and has a CVSS v3.1 base score of 8.8 (HIGH). Successful…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>path-traversal</category><category>file-upload</category><category>cve-2026-5027</category><category>web-application</category></item><item><title>Sharp CMS Path Traversal Vulnerability (CVE-2026-33686)</title><link>https://feed.craftedsignal.io/briefs/2024-05-sharp-path-traversal/</link><pubDate>Thu, 26 Mar 2026 22:16:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-sharp-path-traversal/</guid><description>A path traversal vulnerability exists in Sharp CMS versions prior to 9.20.0 due to improper sanitization of file extensions, potentially allowing attackers to bypass security restrictions and access sensitive files.</description><content:encoded><![CDATA[<p>Sharp CMS, a content management framework built for Laravel, is vulnerable to a path traversal attack. This vulnerability affects versions prior to 9.20.0 and stems from the <code>FileUtil</code> class not properly sanitizing file extensions. The flaw allows attackers to manipulate file paths by injecting path separators, potentially leading to unauthorized file access or manipulation within the storage layer. The vulnerability resides in the <code>FileUtil::explodeExtension()</code> function within…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>cms</category><category>laravel</category><category>web-application</category></item><item><title>Langflow Path Traversal Vulnerability (CVE-2026-33497)</title><link>https://feed.craftedsignal.io/briefs/2026-03-langflow-path-traversal/</link><pubDate>Wed, 25 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-langflow-path-traversal/</guid><description>A path traversal vulnerability in Langflow versions before 1.7.1 allows unauthenticated attackers to read sensitive files via the download_profile_picture endpoint due to insufficient filtering of the folder_name and file_name parameters.</description><content:encoded><![CDATA[<p>Langflow, a tool designed for building and deploying AI-powered agents and workflows, is vulnerable to a path traversal attack (CVE-2026-33497) in versions prior to 1.7.1. The vulnerability resides within the download_profile_picture function of the <code>/profile_pictures/{folder_name}/{file_name}</code> endpoint. Due to inadequate filtering of the <code>folder_name</code> and <code>file_name</code> parameters, an attacker can manipulate these inputs to traverse directories and potentially access sensitive files, including…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>vulnerability</category><category>web-application</category></item><item><title>Census CSWeb 8.0.1 Path Traversal Vulnerability (CVE-2025-60946)</title><link>https://feed.craftedsignal.io/briefs/2026-03-census-csweb-path-traversal/</link><pubDate>Tue, 24 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-census-csweb-path-traversal/</guid><description>CVE-2025-60946 details a vulnerability in Census CSWeb 8.0.1, where arbitrary file path input is permitted, allowing a remote, authenticated attacker to access unintended file directories.</description><content:encoded>&lt;p>Census CSWeb 8.0.1 is vulnerable to path traversal (CVE-2025-60946). A remote, authenticated attacker can supply arbitrary file path input and access unintended file directories. This allows the attacker to read sensitive files or potentially overwrite existing files, leading to information disclosure or code execution. The vulnerability was reported on March 23, 2026, and is fixed in version 8.1.0 alpha. Defenders should upgrade to the patched version to prevent potential exploitation of this…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>cve-2025-60946</category><category>web-application</category></item><item><title>Spring Cloud Config Server Path Traversal Vulnerability (CVE-2026-22739)</title><link>https://feed.craftedsignal.io/briefs/2026-03-spring-cloud-path-traversal/</link><pubDate>Tue, 24 Mar 2026 01:17:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-spring-cloud-path-traversal/</guid><description>A path traversal vulnerability exists in Spring Cloud Config Server versions 3.1.x before 3.1.13, 4.1.x before 4.1.9, 4.2.x before 4.2.3, 4.3.x before 4.3.2, and 5.0.x before 5.0.2, allowing unauthenticated remote attackers to access files outside configured search directories when using the native file system backend.</description><content:encoded>&lt;p>CVE-2026-22739 describes a path traversal vulnerability affecting Spring Cloud Config Server. The vulnerability arises when the Config Server is configured with the native file system backend and processes a request containing a profile parameter. An attacker can manipulate this parameter to access files outside the intended search directories. This issue impacts Spring Cloud versions 3.1.x before 3.1.13, 4.1.x before 4.1.9, 4.2.x before 4.2.3, 4.3.x before 4.3.2, and 5.0.x before 5.0.2. This…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-22739</category><category>path-traversal</category><category>spring-cloud</category></item><item><title>Tekton Pipelines Git Resolver Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-tekton-traversal/</link><pubDate>Tue, 24 Mar 2026 00:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tekton-traversal/</guid><description>The Tekton Pipelines git resolver is vulnerable to path traversal via the `pathInRepo` parameter, allowing arbitrary file reads from the resolver pod's filesystem, including ServiceAccount tokens.</description><content:encoded><![CDATA[<p>The Tekton Pipelines project provides Kubernetes-style resources for declaring CI/CD pipelines. A path traversal vulnerability exists in the git resolver component, tracked as CVE-2026-33211. This vulnerability affects Tekton Pipelines versions 1.0.0 and prior to 1.0.1, 1.3.3, 1.6.1, 1.9.2, and 1.10.2. An attacker with the ability to create <code>ResolutionRequests</code> (e.g., through <code>TaskRuns</code> or <code>PipelineRuns</code> that utilize the git resolver) can exploit this flaw to read any file from the resolver pod&rsquo;s file system. A successful exploit allows attackers to retrieve sensitive information, such as ServiceAccount tokens, which are base64-encoded and returned in <code>resolutionrequest.status.data</code>. The vulnerability has been patched in versions 1.0.1, 1.3.3, 1.6.1, 1.9.2, and 1.10.2. This poses a significant risk in multi-tenant environments where lateral movement and privilege escalation are possible.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains the ability to create <code>TaskRuns</code> or <code>PipelineRuns</code> within a Tekton Pipelines environment.</li>
<li>The attacker crafts a malicious <code>ResolutionRequest</code> that leverages the git resolver.</li>
<li>Within the <code>ResolutionRequest</code>, the attacker injects a path traversal sequence into the <code>pathInRepo</code> parameter, such as &ldquo;../../../../etc/passwd&rdquo;.</li>
<li>The git resolver attempts to resolve the resource using the provided path.</li>
<li>Due to the path traversal vulnerability, the resolver accesses the file specified by the attacker on the resolver pod&rsquo;s file system.</li>
<li>The contents of the accessed file are read by the resolver.</li>
<li>The resolver encodes the file content in base64.</li>
<li>The base64-encoded content is returned in the <code>resolutionrequest.status.data</code> field, allowing the attacker to retrieve the content. This can include sensitive files such as ServiceAccount tokens.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33211 allows attackers to read arbitrary files from the Tekton Pipelines resolver pod. This can lead to the compromise of sensitive information, including ServiceAccount tokens. If ServiceAccount tokens are compromised, attackers can potentially gain unauthorized access to Kubernetes resources, leading to privilege escalation, lateral movement within the cluster, and potential data exfiltration. The impact is especially high in multi-tenant environments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Tekton Pipelines to versions 1.0.1, 1.3.3, 1.6.1, 1.9.2, or 1.10.2 or later to patch CVE-2026-33211.</li>
<li>Implement strict RBAC policies to limit the ability to create <code>TaskRuns</code> and <code>PipelineRuns</code> to only authorized users and service accounts.</li>
<li>Monitor Kubernetes API audit logs for suspicious <code>ResolutionRequest</code> creation events (see rule: &ldquo;Detect Suspicious ResolutionRequest Creation&rdquo;).</li>
<li>Implement network policies to restrict network access from the resolver pod to only necessary resources.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>tekton</category><category>path-traversal</category><category>kubernetes</category><category>cve-2026-33211</category><category>cloud</category></item><item><title>Salvo Web Framework Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-salvo-path-traversal/</link><pubDate>Tue, 24 Mar 2026 00:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-salvo-path-traversal/</guid><description>Salvo web framework versions 0.39.0 through 0.89.2 are vulnerable to Path Traversal and Access Control Bypass, allowing unauthenticated external attackers to bypass proxy routing constraints and access unintended backend paths.</description><content:encoded><![CDATA[<p>Salvo, a Rust web framework, is vulnerable to a path traversal and access control bypass in versions 0.39.0 through 0.89.2. This vulnerability, identified as CVE-2026-33242, resides within the <code>salvo-proxy</code> component. The flaw allows unauthenticated, remote attackers to circumvent proxy routing restrictions and gain access to backend resources that should be protected. The root cause is the <code>encode_url_path</code> function&rsquo;s failure to properly sanitize &ldquo;../&rdquo; sequences within URLs. This leads to the sequences being passed directly to the upstream server without re-encoding, thus bypassing intended access controls. Organizations using affected versions of Salvo are vulnerable until they upgrade to version 0.89.3, which contains the necessary patch.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a Salvo web server running a vulnerable version (0.39.0 - 0.89.2).</li>
<li>The attacker crafts a malicious HTTP request targeting a proxied endpoint.</li>
<li>The crafted request includes a URL containing &ldquo;../&rdquo; sequences to traverse directories outside the intended proxy path.</li>
<li>The <code>encode_url_path</code> function fails to properly normalize or re-encode the &ldquo;../&rdquo; sequence.</li>
<li>The unsanitized URL is forwarded to the upstream server behind the proxy.</li>
<li>The upstream server processes the request, granting access to unintended files or endpoints due to the path traversal.</li>
<li>The attacker gains unauthorized access to sensitive information, protected functionalities, or administrative interfaces.</li>
<li>The attacker may further exploit the compromised resource to escalate privileges or compromise the entire system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthenticated attackers to bypass intended access controls and access sensitive backend resources. The CVSS v3.1 score is 7.5. This could lead to exposure of confidential data, unauthorized modification of system settings, or complete system compromise, depending on the nature of the accessible resources. The number of affected deployments is currently unknown but depends on the adoption rate of the Salvo framework.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Salvo to version 0.89.3 or later to patch CVE-2026-33242.</li>
<li>Implement web application firewall (WAF) rules to detect and block requests containing &ldquo;../&rdquo; sequences in the URL, mitigating potential path traversal attempts.</li>
<li>Deploy the Sigma rules provided below to your SIEM to detect exploitation attempts targeting this vulnerability.</li>
<li>Review and harden proxy configurations to ensure proper input validation and sanitization of URLs.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>access-control-bypass</category><category>web-framework</category></item><item><title>UniFi Network Application Vulnerabilities CVE-2026-22557 and CVE-2026-22558</title><link>https://feed.craftedsignal.io/briefs/2026-03-unifi-vulns/</link><pubDate>Sat, 21 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-unifi-vulns/</guid><description>A combination of path traversal (CVE-2026-22557) and NoSQL injection (CVE-2026-22558) vulnerabilities in the UniFi Network Application allows attackers to access files, escalate privileges, and potentially compromise the entire system.</description><content:encoded>&lt;p>The UniFi Network Application, a central platform for managing network devices across enterprise and SMB environments, is affected by two critical vulnerabilities: CVE-2026-22557 (Path Traversal) and CVE-2026-22558 (Authenticated NoSQL Injection). These vulnerabilities impact Official Release versions 10.1.85 and earlier, Release Candidate versions 10.2.93 and earlier, and UniFi Express (UX) versions 9.0.114 and earlier. Exploitation of CVE-2026-22557 enables attackers to access and manipulate…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>unifi</category><category>path-traversal</category><category>nosql-injection</category><category>cve-2026-22557</category><category>cve-2026-22558</category></item><item><title>Evolver Path Traversal Vulnerability in `fetch` Command</title><link>https://feed.craftedsignal.io/briefs/2024-08-evolver-path-traversal/</link><pubDate>Sat, 10 Aug 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-08-evolver-path-traversal/</guid><description>A path traversal vulnerability exists in the `fetch` command of `@evomap/evolver` due to insufficient validation of the `--out` flag, allowing attackers to write files to arbitrary locations on the filesystem, potentially leading to overwriting critical system files and privilege escalation.</description><content:encoded><![CDATA[<p>The <code>@evomap/evolver</code> package contains a path traversal vulnerability in its <code>fetch</code> command, specifically affecting versions prior to 1.69.3. This flaw arises from the insufficient validation of user-supplied paths provided via the <code>--out</code> flag. By manipulating this flag, attackers can bypass intended directory restrictions and write files to arbitrary locations on the filesystem. This can lead to critical system file modification, potentially leading to privilege escalation and persistent backdoor installation. The vulnerability exists in the <code>index.js</code> file, where the application processes the <code>--out</code> flag without proper sanitization before writing files to the specified directory. This is particularly concerning in automated environments like CI/CD pipelines where user input might be indirectly injected into the <code>fetch</code> command.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains control over the input to the <code>fetch</code> command, including the <code>--out</code> flag.</li>
<li>The attacker crafts a malicious <code>--out</code> parameter containing path traversal sequences (e.g., <code>../../../</code>).</li>
<li>The <code>fetch</code> command in <code>index.js</code> processes the <code>--out</code> flag and extracts the user-provided path without validation.</li>
<li>The application attempts to create the directory specified by the manipulated <code>--out</code> flag using <code>fs.mkdirSync</code> with the <code>recursive</code> option.</li>
<li>The application writes files (e.g., downloaded skill files) to the directory specified in the <code>--out</code> parameter using <code>fs.writeFileSync</code>, effectively writing to an arbitrary location.</li>
<li>If the attacker has sufficient privileges, they can overwrite critical system files or create new files in sensitive directories like <code>/etc/cron.d</code>.</li>
<li>The attacker leverages the modified files to achieve persistence (e.g., by creating a cron job).</li>
<li>The attacker executes malicious code, gaining unauthorized access or escalating privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to write files to arbitrary locations on the filesystem. This can lead to several critical consequences, including overwriting system configuration files, installing persistent backdoors via cron jobs, modifying SSH authorized_keys for unauthorized access, and potentially achieving privilege escalation if the affected process runs with elevated privileges. The impact is particularly severe in automated environments where this tool is used to deploy code, as it opens the door for supply chain attacks. This issue affects users of <code>@evomap/evolver</code> prior to version 1.69.3.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the <code>@evomap/evolver</code> package to version 1.69.3 or later to remediate the path traversal vulnerability.</li>
<li>Deploy the Sigma rule <code>Detect Evolver Path Traversal Attempt</code> to identify exploitation attempts based on command-line arguments.</li>
<li>Monitor process creation events for command-line arguments containing path traversal sequences like <code>../</code> when executing <code>node</code> or <code>nodejs</code> related to evolver.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>arbitrary-file-write</category><category>privilege-escalation</category><category>evolver</category></item><item><title>SimpleHelp Path Traversal Vulnerability (CVE-2024-57728)</title><link>https://feed.craftedsignal.io/briefs/2024-06-simplehelp-path-traversal/</link><pubDate>Tue, 25 Jun 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-06-simplehelp-path-traversal/</guid><description>CVE-2024-57728 is a path traversal vulnerability in SimpleHelp that allows admin users to upload arbitrary files anywhere on the file system by uploading a crafted zip file, potentially leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>A path traversal vulnerability exists within SimpleHelp, identified as CVE-2024-57728. This flaw enables authenticated administrators to upload arbitrary files to any location on the server&rsquo;s file system. This is achieved through the use of a specially crafted ZIP archive (a technique known as Zip Slip). Successful exploitation allows an attacker to execute arbitrary code within the security context of the SimpleHelp server user. The vulnerability impacts SimpleHelp versions 5.5.7 and earlier. Defenders should apply vendor-provided mitigations or discontinue use of the software.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains administrative access to the SimpleHelp console, either through compromised credentials or exploiting a separate authentication bypass.</li>
<li>The attacker crafts a malicious ZIP archive containing a file with a path traversal sequence (e.g., &ldquo;../../ malicious.exe&rdquo;) in its filename.</li>
<li>The attacker uploads the crafted ZIP archive to the SimpleHelp server through a file upload functionality available to administrators.</li>
<li>The SimpleHelp server extracts the contents of the ZIP archive without proper validation of the file paths.</li>
<li>The file with the path traversal sequence is extracted to an arbitrary location on the file system outside of the intended upload directory.</li>
<li>The attacker leverages a method to execute the uploaded malicious executable. This could involve overwriting an existing system utility or service executable.</li>
<li>The malicious executable runs with the privileges of the SimpleHelp server user.</li>
<li>The attacker achieves arbitrary code execution on the host, potentially leading to complete system compromise, data exfiltration, or deployment of ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2024-57728 allows an attacker to execute arbitrary code on the SimpleHelp server with the privileges of the SimpleHelp service account. This can result in a full compromise of the SimpleHelp server, potentially leading to data theft, service disruption, or further lateral movement within the network. The vulnerability affects SimpleHelp installations, and the impact is high due to the potential for complete system takeover.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the mitigations provided by SimpleHelp to patch the vulnerability. Refer to the vendor advisory for instructions: <a href="https://simple-help.com/kb---security-vulnerabilities-01-2025#security-vulnerabilities-in-simplehelp-5-5-7-and-earlier">https://simple-help.com/kb---security-vulnerabilities-01-2025#security-vulnerabilities-in-simplehelp-5-5-7-and-earlier</a></li>
<li>Monitor SimpleHelp server file uploads for ZIP archives containing path traversal sequences (e.g., &ldquo;../&rdquo;) in filenames using a file integrity monitoring system (FIM) or endpoint detection and response (EDR) solution. Deploy the &ldquo;Detect SimpleHelp Path Traversal ZIP Upload&rdquo; Sigma rule to identify suspicious ZIP files.</li>
<li>Implement strict access controls and regularly audit administrative access to the SimpleHelp console to prevent unauthorized users from exploiting the vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2024-57728</category><category>path-traversal</category><category>zip-slip</category></item><item><title>Samsung MagicINFO 9 Server Path Traversal Vulnerability (CVE-2024-7399)</title><link>https://feed.craftedsignal.io/briefs/2024-06-magicinfo-path-traversal/</link><pubDate>Wed, 19 Jun 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-06-magicinfo-path-traversal/</guid><description>A path traversal vulnerability in Samsung MagicINFO 9 Server could allow an attacker to write arbitrary files with system privileges, potentially leading to code execution or system compromise.</description><content:encoded><![CDATA[<p>A critical path traversal vulnerability, identified as CVE-2024-7399, affects Samsung MagicINFO 9 Server. This flaw could be exploited by an attacker to write arbitrary files to the server with system-level privileges. Successful exploitation could lead to a complete compromise of the MagicINFO server, potentially allowing attackers to execute arbitrary code, install backdoors, or manipulate data stored on the server. Given the potential for widespread impact, organizations utilizing MagicINFO 9 Server should prioritize patching or mitigating this vulnerability immediately. The vulnerability was added to the CISA Known Exploited Vulnerabilities (KEV) catalog, highlighting its active exploitation risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable MagicINFO 9 Server instance exposed to the network.</li>
<li>The attacker crafts a malicious HTTP request containing a path traversal sequence (e.g., &ldquo;../&rdquo;) in a file upload or download parameter.</li>
<li>The server improperly processes the path, failing to sanitize the input and allowing the attacker to traverse outside the intended directory.</li>
<li>The attacker uses the path traversal vulnerability to write a malicious file (e.g., a web shell or executable) to a sensitive directory, such as the web server&rsquo;s root directory or a startup folder.</li>
<li>The attacker executes the malicious file, gaining arbitrary code execution on the server with system privileges.</li>
<li>The attacker establishes a persistent backdoor for future access, potentially installing tools for lateral movement and privilege escalation.</li>
<li>The attacker leverages their system privileges to access sensitive data, modify system configurations, or launch further attacks against the internal network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2024-7399 can lead to complete system compromise, potentially affecting all connected displays and content managed by the MagicINFO server. This could result in unauthorized access to sensitive data, disruption of digital signage operations, and the potential for further attacks against the organization&rsquo;s internal network. The vulnerability has been added to the CISA KEV catalog, indicating active exploitation, and therefore a high risk of exploitation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the mitigations provided by Samsung as described in their security update (<a href="https://security.samsungtv.com/securityUpdates)">https://security.samsungtv.com/securityUpdates)</a>.</li>
<li>If mitigations are unavailable, discontinue use of the product, as suggested by CISA.</li>
<li>Monitor web server logs for suspicious requests containing path traversal sequences (e.g., &ldquo;../&rdquo;) targeting the MagicINFO server. Use the <code>MagicINFO Path Traversal Attempt</code> Sigma rule to detect such attempts in web server logs.</li>
<li>Implement strict input validation and sanitization for all file upload and download functionalities on the MagicINFO server.</li>
<li>Monitor for the creation of unexpected files in sensitive directories, such as web server root directories or system startup folders. Use the <code>Suspicious File Creation in Web Directories</code> Sigma rule to detect such activity.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>path-traversal</category><category>cve-2024-7399</category><category>samsung</category></item><item><title>JetBrains TeamCity Relative Path Traversal Vulnerability (CVE-2024-27199)</title><link>https://feed.craftedsignal.io/briefs/2024-04-teamcity-path-traversal/</link><pubDate>Mon, 29 Apr 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-04-teamcity-path-traversal/</guid><description>A relative path traversal vulnerability in JetBrains TeamCity (CVE-2024-27199) could allow limited administrative actions and has been linked to ransomware attacks.</description><content:encoded><![CDATA[<p>CVE-2024-27199 is a relative path traversal vulnerability affecting JetBrains TeamCity, a continuous integration and deployment server. This vulnerability allows attackers to perform limited administrative actions by manipulating file paths. JetBrains released a patch for this vulnerability in version 2023.11.4. CISA has added CVE-2024-27199 to its Known Exploited Vulnerabilities catalog, indicating active exploitation in the wild, including its use in ransomware attacks. The vulnerability poses a significant risk to organizations using TeamCity, potentially leading to unauthorized access, data breaches, and system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable TeamCity server exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP request containing a relative path traversal sequence (e.g., <code>../../</code>) within a URL parameter related to administrative functions.</li>
<li>The TeamCity server processes the crafted request without proper sanitization of the file path.</li>
<li>The relative path traversal allows the attacker to access or modify restricted files or directories outside the intended scope.</li>
<li>The attacker leverages the ability to perform limited admin actions, potentially modifying user permissions or injecting malicious code.</li>
<li>The attacker escalates privileges, gaining full control over the TeamCity server.</li>
<li>The attacker deploys ransomware to connected systems, encrypting data and demanding a ransom for its release.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2024-27199 can lead to complete compromise of the TeamCity server and connected build agents. Due to TeamCity&rsquo;s central role in software development and deployment pipelines, this can lead to significant disruption, data loss, and potential supply chain attacks. The vulnerability has been linked to ransomware attacks, causing financial losses, reputational damage, and operational downtime for affected organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the vendor-supplied patch by upgrading to TeamCity version 2023.11.4 or later to remediate CVE-2024-27199 (<a href="https://www.jetbrains.com/privacy-security/issues-fixed/">https://www.jetbrains.com/privacy-security/issues-fixed/</a>).</li>
<li>Deploy the Sigma rules provided in this brief to detect exploitation attempts against TeamCity servers.</li>
<li>Follow CISA&rsquo;s BOD 22-01 guidance for cloud services to ensure proper security configurations and monitoring are in place.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>cve-2024-27199</category><category>path-traversal</category><category>ransomware</category><category>jetbrains</category></item><item><title>ConnectWise ScreenConnect Path Traversal Vulnerability (CVE-2024-1708)</title><link>https://feed.craftedsignal.io/briefs/2024-04-29-screenconnect-path-traversal/</link><pubDate>Mon, 29 Apr 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-04-29-screenconnect-path-traversal/</guid><description>CVE-2024-1708 is a path traversal vulnerability in ConnectWise ScreenConnect that could allow an attacker to execute remote code or directly impact confidential data and critical systems.</description><content:encoded><![CDATA[<p>CVE-2024-1708 is a critical path traversal vulnerability affecting ConnectWise ScreenConnect. This flaw could allow an unauthenticated attacker to execute remote code or directly access confidential data and critical systems. ConnectWise released security bulletin 23.9.8 to address this vulnerability. Given the potential for remote code execution and data compromise, this vulnerability poses a significant risk to organizations using ConnectWise ScreenConnect, potentially allowing full system takeover. CISA added this to their KEV catalog and recommends applying mitigations per vendor instructions, following BOD 22-01 guidance for cloud services, or discontinuing use of the product if mitigations are unavailable.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a ConnectWise ScreenConnect server exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP request containing a path traversal payload targeting a vulnerable endpoint within ScreenConnect. This payload is designed to bypass authentication checks.</li>
<li>The ScreenConnect server processes the malicious request, and the path traversal vulnerability allows the attacker to access files outside of the intended webroot directory.</li>
<li>The attacker leverages the file access to read sensitive configuration files, potentially containing credentials or other sensitive information.</li>
<li>Alternatively, the attacker uploads a malicious executable (e.g., a web shell) to a writeable directory accessible via path traversal.</li>
<li>The attacker executes the uploaded web shell, gaining remote code execution on the ScreenConnect server.</li>
<li>The attacker uses the compromised ScreenConnect server as a pivot point to move laterally within the internal network, escalating privileges and compromising additional systems.</li>
<li>The attacker exfiltrates sensitive data or deploys ransomware, disrupting business operations and causing significant financial damage.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2024-1708 can lead to complete compromise of ConnectWise ScreenConnect servers and potentially the entire network. Attackers could exfiltrate sensitive data, deploy ransomware, or use the compromised systems for lateral movement. Given the widespread use of ScreenConnect in MSP environments, a successful attack could impact numerous downstream clients, causing widespread disruption.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the mitigations provided by ConnectWise in security bulletin 23.9.8 to patch CVE-2024-1708.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious ScreenConnect Path Traversal Attempts&rdquo; to identify potential exploitation attempts in web server logs.</li>
<li>Monitor network traffic for suspicious outbound connections originating from ScreenConnect servers, as this could indicate post-exploitation activity.</li>
<li>Review and harden the configuration of ConnectWise ScreenConnect servers, following security best practices to minimize the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>path-traversal</category><category>remote-code-execution</category><category>cve-2024-1708</category><category>connectwise</category></item><item><title>Kentico Xperience Path Traversal Vulnerability (CVE-2025-2749)</title><link>https://feed.craftedsignal.io/briefs/2024-01-kentico-traversal/</link><pubDate>Tue, 30 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-kentico-traversal/</guid><description>Kentico Xperience contains a path traversal vulnerability (CVE-2025-2749) that could allow an authenticated user's Staging Sync Server to upload arbitrary data to path relative locations, potentially leading to remote code execution or data compromise.</description><content:encoded><![CDATA[<p>CVE-2025-2749 is a path traversal vulnerability affecting Kentico Xperience, a digital experience platform. This vulnerability allows an authenticated user, specifically one with access to the Staging Sync Server, to upload arbitrary data to path-relative locations on the server. The vulnerability stems from insufficient validation of file paths during the staging synchronization process. Successful exploitation of this vulnerability could lead to arbitrary file uploads, potentially overwriting critical system files or introducing malicious code. This could enable an attacker to achieve remote code execution, compromise sensitive data, or disrupt the availability of the Kentico Xperience instance. Due to the potential for significant impact, organizations using Kentico Xperience should apply mitigations as soon as possible.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains valid credentials for a Kentico Xperience user account that has access to the Staging Sync Server.</li>
<li>The attacker crafts a malicious payload containing a path traversal sequence (e.g., &ldquo;../../../&rdquo;) within the file path.</li>
<li>The attacker initiates a staging synchronization process, sending the crafted payload to the Staging Sync Server.</li>
<li>The Staging Sync Server, due to insufficient path validation, processes the payload and attempts to upload the data to the attacker-specified path.</li>
<li>The system uploads the arbitrary data to an unintended location due to the path traversal vulnerability.</li>
<li>If the uploaded file overwrites an existing executable, the attacker may achieve remote code execution.</li>
<li>Alternatively, the uploaded file could contain a web shell allowing the attacker to execute commands on the server.</li>
<li>The attacker exploits the uploaded web shell or executable to gain further access and compromise the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-2749 can lead to arbitrary file uploads on the Kentico Xperience server. This could result in several severe consequences, including remote code execution, data compromise, and denial of service. While the exact number of affected organizations is unknown, organizations in various sectors rely on Kentico Xperience for their web content management needs. If exploited, attackers could gain complete control over the affected systems, leading to significant financial and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply mitigations per vendor instructions, specifically the hotfixes available on the Kentico devnet portal to address CVE-2025-2749.</li>
<li>Follow applicable BOD 22-01 guidance for cloud services if the Kentico Xperience instance is hosted in a cloud environment.</li>
<li>Deploy the Sigma rule &ldquo;Detect Kentico Staging Sync Path Traversal Attempt&rdquo; to monitor for suspicious file uploads with path traversal sequences in web server logs.</li>
<li>Regularly review and audit user accounts with access to the Staging Sync Server to minimize the risk of compromised credentials.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path traversal</category><category>cve-2025-2749</category><category>kentico</category></item><item><title>i18next-http-middleware Prototype Pollution and Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-i18next-http-middleware-vuln/</link><pubDate>Fri, 26 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-i18next-http-middleware-vuln/</guid><description>Versions of i18next-http-middleware before 3.9.3 are vulnerable to prototype pollution, path traversal, and server-side request forgery (SSRF) due to improper validation of user-controlled language and namespace parameters, potentially leading to denial of service or remote code execution.</description><content:encoded><![CDATA[<p>i18next-http-middleware versions prior to 3.9.3 are susceptible to prototype pollution, path traversal, and SSRF attacks. The vulnerability stems from the insufficient validation of the <code>lng</code> (language) and <code>ns</code> (namespace) parameters passed via HTTP requests to the <code>getResourcesHandler</code> and the <code>missingKeyHandler</code>. These handlers, intended to serve localization resources, expose attack surface because they process user-controlled input without proper sanitization. This allows attackers to manipulate object properties, access unintended files or internal services, and cause denial-of-service conditions. The vulnerability was discovered via an internal security audit. Defenders should upgrade to version 3.9.3 to remediate the risks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts an HTTP GET request to the <code>/locales/resources.json</code> endpoint, targeting the <code>getResourcesHandler</code>.</li>
<li>The request includes malicious <code>lng</code> and <code>ns</code> query parameters, such as <code>lng=__proto__&amp;ns=isAdmin</code>, or <code>ns=../../etc/passwd</code>.</li>
<li>The <code>getResourcesHandler</code> extracts the <code>lng</code> and <code>ns</code> parameters without sufficient validation.</li>
<li>The <code>lng</code> and <code>ns</code> values are passed to <code>utils.setPath(resources, [lng, ns], ...)</code> which allows writing to the Object prototype if <code>lng</code> is <code>__proto__</code>.</li>
<li>The <code>lng</code> and <code>ns</code> values are passed to <code>i18next.services.backendConnector.load(languages, namespaces, ...)</code> to load resource bundles. With filesystem or HTTP backends, this can enable path traversal or SSRF if <code>ns</code> or <code>lng</code> contain malicious path segments.</li>
<li>Alternatively, the attacker sends a POST request with a body containing a malicious <code>__proto__</code> key to <code>missingKeyHandler</code>, for example <code>{&quot;__proto__&quot;: {&quot;isAdmin&quot;: true}}</code>.</li>
<li>The <code>missingKeyHandler</code> iterates over the request body using <code>for...in</code>, including inherited prototype properties, and forwards the malicious data into <code>saveMissing</code>.</li>
<li>Successful exploitation leads to prototype pollution, arbitrary file access, SSRF, or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can have significant consequences. Prototype pollution allows attackers to manipulate object properties globally, leading to broken authorization checks (e.g., bypassing <code>if (user.isAdmin)</code>), type confusion errors, or potentially remote code execution. Path traversal enables access to sensitive files on the server, like configuration files or password databases, while SSRF allows attackers to interact with internal services. Finally, the unbounded growth of the <code>i18next.options.ns</code> list and repeated backend load calls can lead to denial of service due to memory and CPU exhaustion. This can impact availability of the service and potentially other services on the same host.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to <code>i18next-http-middleware</code> version 3.9.3 or later to address the vulnerabilities.</li>
<li>Deploy the Sigma rules provided below to detect exploitation attempts targeting the <code>getResourcesHandler</code> and <code>missingKeyHandler</code> endpoints.</li>
<li>If upgrading is not immediately feasible, implement a WAF rule as a partial mitigation to block requests containing <code>__proto__</code>, <code>constructor</code>, <code>prototype</code>, <code>..</code>, or control characters in <code>lng</code>/<code>ns</code> query parameters or body keys as suggested in the advisory.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>prototype-pollution</category><category>path-traversal</category><category>ssrf</category><category>denial-of-service</category><category>i18next</category></item><item><title>i18next-fs-backend Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-25-i18next-fs-backend-path-traversal/</link><pubDate>Thu, 25 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-25-i18next-fs-backend-path-traversal/</guid><description>i18next-fs-backend versions before 2.6.4 are vulnerable to path traversal due to insufficient sanitization of the lng and ns values, potentially allowing attackers to read arbitrary files, overwrite files, or execute code if .js or .ts locale files are in use.</description><content:encoded><![CDATA[<p>The i18next-fs-backend library, a file system backend for the i18next internationalization framework, is vulnerable to a path traversal attack in versions prior to 2.6.4. This vulnerability arises from the unsanitized use of the <code>lng</code> (language) and <code>ns</code> (namespace) parameters when constructing file paths for loading and writing locale files. If an application exposes the language code to user input, an attacker can craft a malicious <code>lng</code> or <code>ns</code> value containing directory traversal sequences (e.g., <code>../</code>) to escape the intended locale directory. Successful exploitation can lead to arbitrary file read, arbitrary file overwrite, and, if <code>.js</code> or <code>.ts</code> files are used for localization, arbitrary code execution. This vulnerability highlights the importance of input validation, especially when constructing file paths from user-controlled data. The vulnerability was patched in version 2.6.4.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an application using a vulnerable version of <code>i18next-fs-backend</code> (versions prior to 2.6.4) and exposes the language code to user input via query parameters (e.g., <code>?lng=</code>), cookies, or request headers.</li>
<li>The attacker crafts a malicious <code>lng</code> value containing directory traversal sequences, such as <code>../../../../etc</code>, to target sensitive files outside the intended locale directory.</li>
<li>The attacker sends a request to the application with the crafted <code>lng</code> parameter.</li>
<li>The application passes the unsanitized <code>lng</code> value to the <code>i18next.t()</code> function.</li>
<li>The <code>i18next-fs-backend</code> library interpolates the malicious <code>lng</code> value into the <code>loadPath</code> configuration option, without proper validation.  For example, <code>loadPath: '/locales/{{lng}}/{{ns}}.json'</code> becomes <code>/locales/../../../../etc/{{ns}}.json</code>.</li>
<li>The backend attempts to read the file specified by the crafted path (e.g., <code>/etc/passwd</code>).</li>
<li>If successful, the contents of the targeted file are returned as a translation resource, potentially exposing sensitive information. If the attacker crafted the <code>lng</code> or <code>ns</code> value to point to a <code>.js</code> or <code>.ts</code> file containing malicious code, the backend will execute the file using <code>eval()</code>, leading to arbitrary code execution on the server.</li>
<li>Alternatively, if the application attempts to write a missing translation key using the crafted path (via <code>addPath</code>), the attacker could overwrite arbitrary files on the system, potentially leading to application compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can have severe consequences. Arbitrary file read allows attackers to access sensitive data, such as configuration files, database credentials, or application source code. Arbitrary file overwrite can lead to application malfunction or complete compromise. If the application uses <code>.js</code> or <code>.ts</code> files for localization and the attacker is able to inject malicious code into those files through path traversal, arbitrary code execution can result, potentially allowing the attacker to gain full control of the server. The number of victims depends on the popularity and configuration of applications using the vulnerable <code>i18next-fs-backend</code> library.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to <code>i18next-fs-backend</code> version 2.6.4 or later to patch the path traversal vulnerability as this version introduces the <code>isSafePathSegment</code> and <code>interpolatePath</code> functions to sanitize the path.</li>
<li>If upgrading is not immediately feasible, sanitize the <code>lng</code> and <code>ns</code> values at the application boundary before passing them to <code>i18next</code>. Reject values containing <code>..</code>, <code>/</code>, <code>\</code>, control characters, and limit the length to prevent path traversal as mentioned in the advisory.</li>
<li>If using <code>.js</code> or <code>.ts</code> locale files, carefully review them for any suspicious or unexpected code. The advisory highlights that these files must be treated as trusted code.</li>
<li>Monitor web server logs for suspicious requests containing directory traversal sequences in the <code>lng</code> or <code>ns</code> parameters. Deploy the first Sigma rule for this purpose.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>i18next</category><category>arbitrary-file-read</category><category>arbitrary-file-write</category><category>code-execution</category></item><item><title>Kaggle-MCP Path Traversal Vulnerability in prepare_kaggle_dataset Function</title><link>https://feed.craftedsignal.io/briefs/2024-01-kaggle-mcp-path-traversal/</link><pubDate>Tue, 09 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-kaggle-mcp-path-traversal/</guid><description>A path traversal vulnerability exists in the prepare_kaggle_dataset function of kaggle-mcp up to version 406127ffcb2b91b8c10e20e6c2ca787fbc1dc92d, allowing remote attackers to access arbitrary files by manipulating the competition_id argument.</description><content:encoded><![CDATA[<p>A path traversal vulnerability has been identified in the kaggle-mcp project, specifically affecting versions up to 406127ffcb2b91b8c10e20e6c2ca787fbc1dc92d. The vulnerability resides within the <code>prepare_kaggle_dataset</code> function located in the <code>src/kaggle_mcp/server.py</code> file.  Successful exploitation allows a remote attacker to read sensitive files from the server. The vulnerability stems from insufficient sanitization of the <code>competition_id</code> argument. The exploit is publicly known, increasing the risk of widespread exploitation. The project uses a rolling release model, making it difficult to pinpoint specific affected versions. The maintainers have been notified but have not yet addressed the issue.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable kaggle-mcp instance.</li>
<li>The attacker crafts a malicious HTTP request targeting the endpoint that utilizes the <code>prepare_kaggle_dataset</code> function.</li>
<li>The attacker injects a path traversal sequence (e.g., <code>../</code>) into the <code>competition_id</code> parameter of the HTTP request.</li>
<li>The application fails to properly sanitize the <code>competition_id</code> parameter.</li>
<li>The <code>prepare_kaggle_dataset</code> function uses the unsanitized <code>competition_id</code> to construct a file path.</li>
<li>The application accesses a file outside of the intended directory due to the path traversal.</li>
<li>The attacker receives the contents of the accessed file in the HTTP response.</li>
<li>The attacker repeats this process to enumerate and exfiltrate sensitive files, potentially gaining access to credentials, configuration files, or source code.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to read arbitrary files on the server hosting the kaggle-mcp application. This can lead to the disclosure of sensitive information, such as configuration files containing database credentials, API keys, or source code. This information can be further leveraged to compromise other systems or data. The number of potential victims is unknown, but depends on the adoption rate of the vulnerable kaggle-mcp application.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for HTTP requests containing path traversal sequences (e.g., <code>../</code>, <code>..%2f</code>) in the <code>cs-uri-query</code> field targeting endpoints associated with the <code>prepare_kaggle_dataset</code> function using the provided Sigma rule.</li>
<li>Implement input validation and sanitization on the <code>competition_id</code> parameter to prevent path traversal attacks.</li>
<li>Monitor web server logs for unusual file access patterns originating from the kaggle-mcp application based on the provided Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>web-application</category><category>cve</category></item><item><title>Xerte Online Toolkits Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-xerte-path-traversal/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-xerte-path-traversal/</guid><description>Xerte Online Toolkits 3.15 and earlier are vulnerable to relative path traversal, allowing attackers to move files and potentially achieve remote code execution.</description><content:encoded><![CDATA[<p>Xerte Online Toolkits, a tool used to create online learning materials, is vulnerable to a path traversal vulnerability (CVE-2026-34414) in versions 3.15 and earlier. The vulnerability exists in the elFinder connector endpoint at <code>/editor/elfinder/php/connector.php</code>. The <code>name</code> parameter within rename commands is not properly sanitized, allowing attackers to use directory traversal sequences (e.g., <code>../</code>) to manipulate file locations. This flaw can be exploited to overwrite application files, inject stored cross-site scripting (XSS), or, when combined with other vulnerabilities, achieve unauthenticated remote code execution (RCE). This poses a significant threat to organizations utilizing affected versions of Xerte Online Toolkits, potentially leading to data breaches, system compromise, and reputational damage.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable Xerte Online Toolkits instance running version 3.15 or earlier.</li>
<li>The attacker crafts a malicious HTTP request to <code>/editor/elfinder/php/connector.php</code> targeting the rename command.</li>
<li>Within the request, the <code>name</code> parameter contains directory traversal sequences (e.g., <code>../../</code>) and the desired destination path.</li>
<li>The server, due to insufficient input validation, processes the request without properly sanitizing the <code>name</code> parameter.</li>
<li>The attacker moves a file (e.g., an uploaded image or media file) from its original project media directory to a new location specified within the malicious <code>name</code> parameter. This could involve moving a file to the application root directory.</li>
<li>If the attacker moves a specifically crafted PHP file to the application root and the webserver is configured to execute PHP files in the root, the attacker can then access this file via a web request.</li>
<li>The attacker executes arbitrary code on the server.</li>
<li>The attacker gains complete control of the Xerte Online Toolkits instance and potentially the underlying server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to several critical consequences. Attackers can overwrite sensitive application files, leading to denial of service or system instability. The injection of malicious JavaScript code can result in stored cross-site scripting (XSS) attacks, compromising user accounts and data. The most severe outcome is unauthenticated remote code execution (RCE), enabling attackers to gain complete control over the affected server, potentially leading to data breaches, malware deployment, and further lateral movement within the network. The CVSS v3.1 base score for this vulnerability is 7.1, indicating a high level of risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Xerte Online Toolkits to a version greater than 3.15 to patch CVE-2026-34414.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Path Traversal in Xerte Connector</code> to identify attempted exploitation of the path traversal vulnerability by monitoring requests to <code>/editor/elfinder/php/connector.php</code> with directory traversal sequences.</li>
<li>Implement input validation and sanitization on the <code>name</code> parameter within the elFinder connector to prevent path traversal attacks.</li>
<li>Review web server configurations to prevent the execution of PHP files from the web root directory.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>path-traversal</category><category>remote-code-execution</category><category>xss</category></item><item><title>pygeoapi Path Traversal Vulnerability in STAC FileSystemProvider</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-pygeoapi-path-traversal/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-pygeoapi-path-traversal/</guid><description>A path traversal vulnerability exists in pygeoapi versions 0.23.0 to 0.23.2 within the STAC FileSystemProvider plugin, allowing unauthenticated access to directories when deployed without a URL-normalizing proxy.</description><content:encoded><![CDATA[<p>A path traversal vulnerability has been identified in pygeoapi versions 0.23.0, 0.23.1, and 0.23.2, specifically within the STAC (Spatially Aware Catalog) FileSystemProvider plugin. This flaw allows unauthenticated attackers to access unauthorized directories by manipulating URL paths, particularly when pygeoapi is deployed without a proxy or web front end that normalizes URLs containing <code>..</code> sequences. The vulnerability arises from improper handling of raw string path concatenation, making systems with STAC collection-based resources in their configuration susceptible to unauthorized file system access. This issue was resolved in version 0.23.3.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious HTTP request targeting a pygeoapi instance configured with a STAC collection resource.</li>
<li>The crafted request includes a URL containing path traversal sequences (e.g., <code>../</code>) to navigate the file system.</li>
<li>pygeoapi&rsquo;s STAC FileSystemProvider plugin receives the request and attempts to resolve the file path.</li>
<li>Due to the raw string path concatenation vulnerability, the path traversal sequences are not properly sanitized.</li>
<li>The application constructs an incorrect file path, allowing access to files and directories outside of the intended STAC collection directory.</li>
<li>The attacker retrieves sensitive information or configuration files located in the exposed directories.</li>
<li>The attacker could potentially use the exposed information to further compromise the system.</li>
<li>The final objective is unauthorized access to sensitive data and potentially system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The path traversal vulnerability in pygeoapi allows unauthorized access to directories and files, potentially exposing sensitive data, configuration files, or even source code. The impact depends on the data stored in the exposed directories. Successful exploitation can lead to information disclosure, privilege escalation, and further system compromise. Organizations using vulnerable pygeoapi versions are at risk until they upgrade to version 0.23.3 or implement the recommended workaround.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to pygeoapi version 0.23.3 to patch the vulnerability as detailed in the advisory (<a href="https://github.com/advisories/GHSA-f6pr-83pg-ghh6">https://github.com/advisories/GHSA-f6pr-83pg-ghh6</a>).</li>
<li>As an immediate mitigation, disable STAC collection-based resources in the pygeoapi configuration as described in the advisory (<a href="https://github.com/advisories/GHSA-f6pr-83pg-ghh6">https://github.com/advisories/GHSA-f6pr-83pg-ghh6</a>).</li>
<li>Deploy the Sigma rule &ldquo;pygeoapi Path Traversal Attempt&rdquo; to detect exploitation attempts in web server logs.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>vulnerability</category><category>webserver</category></item><item><title>Path Traversal Vulnerability in WilliamCloudQi matlab-mcp-server</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-matlab-mcp-server-path-traversal/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-matlab-mcp-server-path-traversal/</guid><description>A path traversal vulnerability exists in WilliamCloudQi matlab-mcp-server up to version ab88f6b9bf5f36f725e8628029f7f6dd0d9913ca, allowing a remote attacker to manipulate the scriptPath argument in the generate_matlab_code/execute_matlab_code function to access arbitrary files.</description><content:encoded><![CDATA[<p>A path traversal vulnerability, identified as CVE-2026-7272, affects WilliamCloudQi&rsquo;s matlab-mcp-server up to commit ab88f6b9bf5f36f725e8628029f7f6dd0d9913ca. The vulnerability resides within the MCP Interface component, specifically in the <code>generate_matlab_code/execute_matlab_code</code> function of the <code>src/index.ts</code> file. A remote attacker can exploit this flaw by manipulating the <code>scriptPath</code> argument, allowing them to traverse the file system and potentially access sensitive files or execute arbitrary code on the server. This vulnerability is remotely exploitable, and an exploit is publicly available. The vendor was notified but has not yet responded. This poses a significant risk to systems running vulnerable versions of matlab-mcp-server.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of WilliamCloudQi matlab-mcp-server running a version up to ab88f6b9bf5f36f725e8628029f7f6dd0d9913ca.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>generate_matlab_code</code> or <code>execute_matlab_code</code> function.</li>
<li>The malicious request includes a manipulated <code>scriptPath</code> argument containing path traversal sequences (e.g., <code>../</code>, <code>..%2f</code>).</li>
<li>The server-side code, without proper validation, uses the attacker-controlled <code>scriptPath</code> to access a file.</li>
<li>The attacker uses the path traversal to navigate to a sensitive file outside the intended directory (e.g., <code>/etc/passwd</code>).</li>
<li>The server reads the contents of the arbitrary file due to the path traversal.</li>
<li>The server includes the contents of the sensitive file in the response sent back to the attacker.</li>
<li>The attacker retrieves the sensitive information from the server&rsquo;s response, such as configuration files, credentials, or source code.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to read arbitrary files on the server. This can lead to the disclosure of sensitive information, including configuration files, credentials, source code, or other data stored on the server&rsquo;s file system. This information can then be used for further attacks, such as privilege escalation or lateral movement within the network. The number of potential victims is unknown, but any system running a vulnerable version of matlab-mcp-server is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply appropriate input validation and sanitization to the <code>scriptPath</code> argument in the <code>generate_matlab_code</code> and <code>execute_matlab_code</code> functions to prevent path traversal attacks.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect potential exploitation attempts targeting this vulnerability.</li>
<li>Monitor web server logs for suspicious requests containing path traversal sequences (e.g., <code>../</code>, <code>..%2f</code>) in the <code>scriptPath</code> parameter.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>web-vulnerability</category></item><item><title>Pardus Software Center Path Traversal Vulnerability (CVE-2026-5166)</title><link>https://feed.craftedsignal.io/briefs/2024-01-pardus-path-traversal/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-pardus-path-traversal/</guid><description>CVE-2026-5166 is a path traversal vulnerability affecting TUBITAK BILGEM Software Technologies Research Institute Pardus Software Center before version 1.0.3, allowing attackers to bypass directory restrictions.</description><content:encoded><![CDATA[<p>CVE-2026-5166 is a critical path traversal vulnerability discovered in TUBITAK BILGEM Software Technologies Research Institute Pardus Software Center, affecting versions prior to 1.0.3. This vulnerability allows an attacker to bypass directory restrictions and potentially access sensitive files or execute arbitrary code on the underlying system. Path traversal vulnerabilities arise when an application does not properly sanitize user-supplied input used to construct file paths. This can lead to unauthorized access and modification of data, potentially leading to a full system compromise. The vulnerability was published on 2026-04-29, but due to its severity, detection engineers should prioritize creating detections for it.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an endpoint in Pardus Software Center that accepts file paths as input.</li>
<li>The attacker crafts a malicious request containing a path traversal payload, such as &ldquo;../../../etc/passwd&rdquo;.</li>
<li>The application fails to properly sanitize the input, allowing the path traversal sequence to be processed.</li>
<li>The application constructs a file path using the unsanitized input, effectively escaping the intended directory.</li>
<li>The application attempts to access the file specified by the attacker-controlled path.</li>
<li>If successful, the attacker can read sensitive files such as configuration files, user data, or system binaries.</li>
<li>The attacker may leverage the ability to read sensitive files to gain further information about the system, such as user credentials or system configuration.</li>
<li>The attacker can then exploit this information to escalate privileges or compromise other parts of the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5166 can lead to unauthorized access to sensitive data, including configuration files, user data, and system binaries. This could allow an attacker to steal credentials, escalate privileges, or compromise the entire system. Given the CVSS v3.1 base score of 9.6, this vulnerability poses a critical risk to systems running affected versions of Pardus Software Center. The exact number of affected systems is currently unknown, but organizations using this software are urged to apply mitigations immediately.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Pardus Software Center to version 1.0.3 or later to patch CVE-2026-5166.</li>
<li>Deploy the Sigma rule <code>Pardus Software Center Path Traversal Attempt</code> to detect exploitation attempts in web server logs.</li>
<li>Monitor web server logs for suspicious requests containing path traversal sequences like &ldquo;../&rdquo; or &ldquo;..&quot; to detect potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-5166</category><category>path-traversal</category><category>web-application</category></item><item><title>OpenMRS ModuleResourcesServlet Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-openmrs-path-traversal/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-openmrs-path-traversal/</guid><description>OpenMRS Core versions 2.7.8 and earlier, as well as versions 2.8.0 through 2.8.5, contain a path traversal vulnerability in the ModuleResourcesServlet, allowing an unauthenticated attacker to read arbitrary files from the server filesystem by manipulating the URL.</description><content:encoded><![CDATA[<p>OpenMRS Core, a widely used open-source medical record system, is vulnerable to a path traversal attack via the <code>ModuleResourcesServlet</code>. This flaw affects versions up to 2.7.8 and versions 2.8.0 through 2.8.5. An unauthenticated attacker can exploit this vulnerability by crafting a malicious URL to read arbitrary files from the server&rsquo;s filesystem. The vulnerability exists because the <code>ModuleResourcesServlet</code> component fails to properly validate user-supplied path input when serving static module resources. This vulnerability is particularly critical because the affected endpoint is not protected by authentication filters, and successful exploitation depends on running Apache Tomcat versions before 8.5.31 or prior to 9.0.10.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable OpenMRS instance running on a susceptible Tomcat version.</li>
<li>The attacker identifies a valid module ID installed on the target OpenMRS instance (e.g., <code>legacyui</code>).</li>
<li>The attacker crafts a malicious HTTP GET request to the <code>/openmrs/moduleResources/{moduleid}</code> endpoint containing a path traversal sequence (e.g., <code>..;</code>) within the URL. The request attempts to access a sensitive file, such as <code>/etc/passwd</code>.</li>
<li>The <code>ModuleResourcesServlet</code> receives the request and extracts the path information without proper validation.</li>
<li>The application constructs a file path by concatenating the web application root, module path, module ID, &ldquo;resources,&rdquo; and the attacker-supplied path.</li>
<li>Due to missing path sanitization and normalization, the resulting file path points to the attacker-specified file outside the intended resources directory.</li>
<li>The server reads the content of the arbitrary file (e.g., <code>/etc/passwd</code>).</li>
<li>The server returns the file content in the HTTP response to the attacker, resulting in information disclosure.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows an unauthenticated attacker to read arbitrary files on the OpenMRS server. This can lead to the exposure of sensitive information, including system configuration files containing database credentials, potentially compromising the entire application and patient data. The number of affected deployments is unknown, but any OpenMRS instance running vulnerable versions on older Tomcat installations is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenMRS Core to a patched version beyond 2.8.5 to address CVE-2026-40075.</li>
<li>As a short-term mitigation, upgrade Apache Tomcat to version 8.5.31 or later, or 9.0.10 or later, to leverage container-level path traversal protection.</li>
<li>Deploy the following Sigma rule to detect exploitation attempts against the vulnerable <code>ModuleResourcesServlet</code> endpoint.</li>
<li>Monitor web server logs for suspicious URL patterns containing path traversal sequences (<code>../</code>, <code>..;</code>, <code>%2e%2e%2f</code>) targeting the <code>/openmrs/moduleResources/</code> path.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>information-disclosure</category><category>openmrs</category></item><item><title>MCPHub Path Traversal Vulnerability via Malicious MCPB Manifest Name</title><link>https://feed.craftedsignal.io/briefs/2024-01-mcphub-path-traversal/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-mcphub-path-traversal/</guid><description>MCPHub is vulnerable to path traversal, where a malicious MCPB file with a crafted manifest.name can cause files to be extracted to arbitrary locations due to missing sanitization in the upload handler.</description><content:encoded><![CDATA[<p>MCPHub is vulnerable to a path traversal vulnerability affecting versions prior to 0.12.13. The vulnerability exists in the MCPB file upload handler, which extracts a ZIP file and reads the <code>manifest.json</code> file. The <code>name</code> field from the manifest is directly concatenated into the file path without any sanitization or path traversal character validation. This allows an attacker to craft a malicious MCPB file with a <code>manifest.name</code> containing directory traversal sequences (e.g., <code>../../../etc/malicious</code>), leading to arbitrary file extraction and potential directory deletion via the <code>cleanupOldMcpbServer</code> function. This vulnerability poses a significant risk to systems running vulnerable versions of MCPHub, potentially allowing attackers to overwrite critical system files or execute arbitrary code.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious MCPB file.</li>
<li>The malicious MCPB file contains a <code>manifest.json</code> file with a <code>name</code> field set to a path traversal string (e.g., <code>../../../tmp/evil</code>).</li>
<li>The attacker uploads the malicious MCPB file to the <code>/mcpb/upload</code> endpoint.</li>
<li>The <code>uploadMcpbFile</code> function extracts the uploaded MCPB file to a temporary directory.</li>
<li>The function reads and parses the <code>manifest.json</code> file from the temporary directory.</li>
<li>The <code>manifest.name</code> value (containing the path traversal string) is used to construct the final extraction directory path using <code>path.join</code>.</li>
<li>The server attempts to create the directory specified by the crafted path and moves the extracted files to this location. Due to the path traversal, the files are written outside the intended directory.</li>
<li>The <code>cleanupOldMcpbServer</code> function may be triggered, attempting to delete directories based on the unsanitized name, though constrained to the upload directory.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this path traversal vulnerability allows an attacker to write files to arbitrary locations on the server&rsquo;s file system. This could lead to overwriting critical system files, injecting malicious code into existing applications, or gaining unauthorized access to sensitive data. The exact impact depends on the permissions of the user running the MCPHub application and the contents of the files being written. If the attacker can overwrite executable files or configuration files, they could achieve arbitrary code execution and full system compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the remediation recommendations from the original advisory: Use <code>path.basename()</code> to strip directory components from <code>manifest.name</code>, and enforce a strict character whitelist before use.</li>
<li>Deploy the Sigma rule &ldquo;Detect MCPHub Path Traversal Attempt via Manifest Name&rdquo; to identify attempts to exploit this vulnerability by monitoring for specific path traversal sequences in the manifest name (see Sigma rule).</li>
<li>Upgrade MCPHub to version 0.12.13 or later to patch this vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>web-application</category><category>mcphub</category></item><item><title>florensiawidjaja BioinfoMCP Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-bioinfomcp-path-traversal/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-bioinfomcp-path-traversal/</guid><description>A path traversal vulnerability in florensiawidjaja BioinfoMCP allows remote attackers to write arbitrary files via manipulation of the 'Name' argument in the Upload function of app.py.</description><content:encoded><![CDATA[<p>A path traversal vulnerability, identified as CVE-2026-7398, affects the BioinfoMCP platform developed by florensiawidjaja. The vulnerability resides in the Upload function within the bioinfo_mcp_platform/app.py file. An attacker can exploit this weakness remotely by manipulating the <code>Name</code> argument during file uploads, allowing them to write files to arbitrary locations on the server. This poses a significant security risk, potentially leading to code execution, data compromise, or denial of service. The exploit is publicly available, increasing the likelihood of exploitation. The BioinfoMCP project utilizes continuous delivery with rolling releases, making it difficult to determine specific affected and patched versions. The project has been notified through an issue report, but no response has been received.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an accessible BioinfoMCP instance.</li>
<li>The attacker crafts a malicious HTTP request targeting the Upload endpoint.</li>
<li>Within the request, the &lsquo;Name&rsquo; argument is manipulated to include path traversal sequences (e.g., ../../).</li>
<li>The server-side application fails to properly sanitize or validate the &lsquo;Name&rsquo; argument.</li>
<li>The application constructs a file path using the attacker-controlled &lsquo;Name&rsquo; argument.</li>
<li>The application writes the uploaded file to the attacker-specified location outside of the intended upload directory.</li>
<li>The attacker uploads a malicious file (e.g., a web shell or executable).</li>
<li>The attacker executes the uploaded file, potentially gaining control of the server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this path traversal vulnerability could allow an attacker to overwrite critical system files, execute arbitrary code on the server, and potentially gain complete control of the affected system. Due to the lack of specific versioning and deployment details, the number of potentially affected instances is unknown. However, given the publicly available exploit, any unpatched BioinfoMCP instance is at immediate risk of compromise. The impact includes potential data breaches, service disruption, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for suspicious requests containing path traversal sequences (e.g., <code>../</code>) in the <code>cs-uri-query</code> targeting the <code>/app.py</code> endpoint, activating the Sigma rule <code>Detect BioinfoMCP Path Traversal Attempt</code>.</li>
<li>Deploy the Sigma rule <code>Detect BioinfoMCP Upload of Executable Files</code> to identify potential malicious file uploads following exploitation.</li>
<li>Implement strict input validation and sanitization on all user-supplied input, especially the &lsquo;Name&rsquo; argument in the Upload function within the bioinfo_mcp_platform/app.py file, to mitigate CVE-2026-7398.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>web-application</category><category>cve-2026-7398</category></item><item><title>AzuraCast Path Traversal Leads to Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2024-01-azuracast-rce/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azuracast-rce/</guid><description>AzuraCast is vulnerable to path traversal in the Flow.js media upload endpoint, allowing authenticated users with media permissions to write arbitrary files, leading to remote code execution via PHP webshell upload.</description><content:encoded><![CDATA[<p>AzuraCast, a self-hosted web radio management suite, is susceptible to a critical path traversal vulnerability (CVE-2026-42605) in its Flow.js media upload endpoint (<code>/api/station/{station_id}/files/upload</code>). This flaw allows an authenticated user with media management permissions, such as a DJ or station manager, to bypass file storage directory restrictions. By manipulating the <code>currentDirectory</code> parameter during file uploads, attackers can write arbitrary files to locations outside the intended media directory. The vulnerability is present in versions up to and including 0.23.5, and exploitation leads to remote code execution via PHP webshell upload, potentially resulting in full server compromise. The default local filesystem storage backend is required for exploitation; S3 or remote storage is not vulnerable.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker authenticates to the AzuraCast web interface with a valid user account that has the <code>StationPermissions::Media</code> permission (e.g., DJ or Station Manager).</li>
<li>The attacker crafts a malicious HTTP POST request to the <code>/api/station/{station_id}/files/upload</code> endpoint, targeting a station that uses local storage.</li>
<li>The request includes a <code>currentDirectory</code> parameter containing path traversal sequences (e.g., <code>../../../../../var/azuracast/www/public</code>).</li>
<li>The request also includes a PHP webshell file (<code>shell.php</code>) as the <code>file_data</code> parameter.</li>
<li>The server-side code in <code>FlowUploadAction.php</code> concatenates the unsanitized <code>currentDirectory</code> value with the sanitized filename.</li>
<li>The server attempts to process the uploaded file, but the <code>.php</code> extension triggers a <code>CannotProcessMediaException</code>.</li>
<li>The <code>finally</code> block in <code>MediaProcessor.php</code> executes, calling <code>LocalFilesystem::upload()</code> to copy the file to the concatenated path, bypassing normal path sanitization due to <code>PathPrefixer::prefixPath()</code>.</li>
<li>The webshell is written to the web root, allowing the attacker to execute arbitrary commands by accessing the webshell via HTTP.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary code on the AzuraCast server. This can lead to full server compromise, including reading sensitive configuration files (database credentials, API keys), accessing all station data, modifying application code, and potentially escalating privileges to root. A DJ-level user, the lowest privileged role with media access, can achieve the equivalent of full system administrator access, resulting in data exfiltration and complete control over the AzuraCast instance.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the vendor-provided patch by sanitizing the <code>currentDirectory</code> parameter in <code>FlowUploadAction.php</code> using <code>UploadedFile::filterClientPath()</code> to prevent path traversal.</li>
<li>Implement path normalization in <code>LocalFilesystem::upload()</code> to prevent traversal even after concatenation, as described in the advisory.</li>
<li>Deploy the Sigma rule &ldquo;Detect AzuraCast Webshell Upload via Path Traversal&rdquo; to identify exploitation attempts based on suspicious <code>currentDirectory</code> parameters.</li>
<li>Monitor web server logs for access to unusual PHP files in the web root directory, such as <code>shell.php</code> as described in the PoC.</li>
<li>Ensure that AzuraCast instances do not grant excessive permissions to users; minimize the number of accounts with <code>StationPermissions::Media</code>.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>path-traversal</category><category>rce</category><category>azuracast</category><category>webserver</category></item><item><title>MLOps_MCP Path Traversal Vulnerability (CVE-2026-7213)</title><link>https://feed.craftedsignal.io/briefs/2024-01-mlops-mcp-path-traversal/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-mlops-mcp-path-traversal/</guid><description>A path traversal vulnerability exists in ef10007 MLOps_MCP version 1.0.0, allowing a remote attacker to manipulate the 'filename/destination' argument in the 'save_file Tool' component's 'fastmcp_server.py' file.</description><content:encoded><![CDATA[<p>A path traversal vulnerability, identified as CVE-2026-7213, has been discovered in ef10007 MLOps_MCP version 1.0.0. The vulnerability resides within the <code>fastmcp_server.py</code> file of the <code>save_file Tool</code> component. It allows a remote attacker to perform path traversal by manipulating the <code>filename/destination</code> argument. The existence of a public exploit increases the risk of exploitation. The vendor has been notified but has not yet responded, leaving users vulnerable to potential attacks. This vulnerability poses a significant risk to systems utilizing the affected MLOps_MCP instance, potentially leading to unauthorized file access, modification, or even execution.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an instance of MLOps_MCP version 1.0.0 accessible remotely.</li>
<li>The attacker crafts a malicious request targeting the <code>fastmcp_server.py</code> file of the <code>save_file Tool</code> component.</li>
<li>Within the request, the attacker manipulates the <code>filename/destination</code> argument to include a path traversal sequence (e.g., <code>../../</code>).</li>
<li>The MLOps_MCP application processes the crafted request without proper validation of the supplied path.</li>
<li>The application attempts to save the file to the attacker-specified path, traversing directories outside the intended storage location.</li>
<li>Depending on the server&rsquo;s permissions, the attacker may be able to overwrite existing files or create new files in arbitrary locations.</li>
<li>If the attacker overwrites a critical system file, it can lead to denial of service.</li>
<li>If the attacker uploads and executes a malicious script, it can lead to complete system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this path traversal vulnerability (CVE-2026-7213) can lead to unauthorized file access, modification, or creation on the affected system. An attacker could potentially overwrite critical system files, leading to denial-of-service conditions. Furthermore, the attacker might be able to upload and execute malicious scripts, resulting in complete system compromise. The CVSS v3.1 base score of 7.3 indicates a high level of severity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect MLOps_MCP Path Traversal Attempt</code> to your SIEM to detect path traversal attempts targeting <code>fastmcp_server.py</code> based on HTTP request parameters.</li>
<li>Implement input validation and sanitization measures on the <code>filename/destination</code> argument within the <code>save_file Tool</code> component to prevent path traversal attacks.</li>
<li>Monitor web server logs for suspicious requests containing path traversal sequences (e.g., <code>../</code>, <code>..\\</code>) as detected by the <code>Detect Web Server Path Traversal</code> rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>web-application</category><category>cve-2026-7213</category></item><item><title>geekgod382 filesystem-mcp-server Path Traversal Vulnerability (CVE-2026-7400)</title><link>https://feed.craftedsignal.io/briefs/2024-01-filesystem-mcp-server-path-traversal/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-filesystem-mcp-server-path-traversal/</guid><description>A path traversal vulnerability exists in geekgod382 filesystem-mcp-server version 1.0.0 allowing remote attackers to access unauthorized files due to insufficient path validation in the is_path_allowed function.</description><content:encoded><![CDATA[<p>A critical path traversal vulnerability, identified as CVE-2026-7400, affects geekgod382 filesystem-mcp-server version 1.0.0. This vulnerability resides within the <code>is_path_allowed</code> function in the <code>server.py</code> file, specifically in the <code>read_file_tool/write_file_tool</code> component. A remote attacker can exploit this weakness to bypass intended access restrictions and potentially read or write sensitive files outside the designated directories. Publicly available exploit code exists, increasing the urgency for remediation. Upgrade to version 1.1.0 to apply the patch (45364545fc60dc80aadcd4379f08042d3d3d292e) and mitigate this risk. This vulnerability allows attackers to potentially gain unauthorized access to the underlying system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of <code>filesystem-mcp-server</code> version 1.0.0 exposed to the network.</li>
<li>The attacker crafts a malicious request targeting the <code>read_file_tool</code> or <code>write_file_tool</code> component.</li>
<li>The crafted request includes a path traversal sequence (e.g., <code>../</code>) within the file path parameter.</li>
<li>The <code>is_path_allowed</code> function fails to properly sanitize the input path, allowing the traversal sequence to bypass intended restrictions.</li>
<li>The application processes the request, accessing a file outside the intended directory.</li>
<li>If using <code>read_file_tool</code>, the contents of the unauthorized file are returned to the attacker.</li>
<li>If using <code>write_file_tool</code>, the attacker can overwrite legitimate files, potentially injecting malicious code.</li>
<li>Successful exploitation allows the attacker to read sensitive information or achieve arbitrary code execution on the server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this path traversal vulnerability (CVE-2026-7400) can allow an attacker to read arbitrary files from the affected server, potentially exposing sensitive data such as configuration files, credentials, or internal documents. If the write_file_tool is exploited, the attacker might overwrite critical system files, leading to denial of service or arbitrary code execution. This issue affects systems running geekgod382 filesystem-mcp-server version 1.0.0.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to geekgod382 filesystem-mcp-server version 1.1.0 to apply the patch (45364545fc60dc80aadcd4379f08042d3d3d292e) that fixes CVE-2026-7400.</li>
<li>Deploy the Sigma rule &ldquo;filesystem-mcp-server Path Traversal Attempt&rdquo; to detect potential exploitation attempts against the filesystem-mcp-server.</li>
<li>Monitor web server logs for suspicious requests containing path traversal sequences (<code>../</code>, <code>..\\</code>) targeting file access endpoints, as this may indicate exploitation attempts.</li>
<li>Implement input validation and sanitization measures to prevent path traversal attacks, even after upgrading, as defense-in-depth.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>web-application</category><category>cve-2026-7400</category></item><item><title>Detect-It-Easy Path Traversal Vulnerability (CVE-2026-43616)</title><link>https://feed.craftedsignal.io/briefs/2024-01-detect-it-easy-path-traversal/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-detect-it-easy-path-traversal/</guid><description>Detect-It-Easy versions prior to 3.21 are vulnerable to path traversal, allowing attackers to write arbitrary files to the filesystem and potentially achieve code execution by crafting malicious archive entries.</description><content:encoded><![CDATA[<p>Detect-It-Easy (DIE) is a program used to detect file types, unpackers, compilers, and crypto information. Versions prior to 3.21 are susceptible to a path traversal vulnerability (CVE-2026-43616). This vulnerability enables a malicious actor to write arbitrary files to the underlying filesystem by crafting archive entries with relative traversal sequences (e.g., &ldquo;../../&rdquo;) or absolute paths. This can be exploited by attackers by overwriting sensitive system files or user startup scripts, thus leading to persistent code execution. The vulnerability stems from insufficient path normalization during archive extraction.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious archive (e.g., ZIP, TAR) containing files with path traversal sequences in their filenames or absolute paths.</li>
<li>The user executes Detect-It-Easy and loads the malicious archive for scanning.</li>
<li>Detect-It-Easy attempts to extract the files from the archive.</li>
<li>Due to insufficient path normalization, the application does not properly sanitize the file paths.</li>
<li>The application writes files outside the intended extraction directory.</li>
<li>The attacker overwrites a user startup script (e.g., .bashrc, .profile) with malicious code.</li>
<li>The user logs in or starts a new shell session.</li>
<li>The malicious code in the startup script executes, granting the attacker persistent access or executing arbitrary commands.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to write arbitrary files to the filesystem with the privileges of the user running Detect-It-Easy. This could lead to complete system compromise through persistent code execution. The impact includes potential data theft, malware installation, or denial of service. While the number of victims is not specified, any user running a vulnerable version of Detect-It-Easy is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Detect-It-Easy to version 3.21 or later to patch CVE-2026-43616.</li>
<li>Implement the Sigma rule &ldquo;Detect-It-Easy Suspicious Archive Extraction&rdquo; to identify potential exploitation attempts by detecting the execution of Detect-It-Easy with archive files containing path traversal sequences.</li>
<li>Monitor file creation events for suspicious file writes outside of expected directories, particularly in user startup script locations, to detect potential exploitation based on file_event logsource.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>vulnerability</category><category>archive-extraction</category></item><item><title>Apko DirFS Symlink Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-apko-path-traversal/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-apko-path-traversal/</guid><description>A symlink-following path traversal vulnerability exists in apko versions prior to 1.2.5 allowing a malicious .apk file to create a symbolic link pointing outside the build root and subsequently modify files on the host system.</description><content:encoded><![CDATA[<p>A path traversal vulnerability exists in apko&rsquo;s <code>DirFS</code> component, specifically within the <code>sanitizePath</code> helper function in versions prior to 1.2.5. The vulnerability allows a malicious <code>.apk</code> file to install a <code>TypeSymlink</code> tar entry pointing outside the intended build root. Subsequent directory creation or file writing operations could then traverse this symbolic link, leading to unauthorized access and modification of files on the host system. This issue affects users of apko and downstream tools, such as melange, that embed vulnerable versions of the <code>pkg/apk/fs</code> package. The vulnerability was addressed in apko version 1.2.5 with the introduction of <code>*os.Root</code>, which prevents path traversal.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious <code>.apk</code> file containing a <code>TypeSymlink</code> tar entry.</li>
<li>The symbolic link&rsquo;s target is set to a path outside the intended build root, potentially targeting sensitive system directories.</li>
<li>The malicious <code>.apk</code> is processed using a vulnerable version of apko (prior to 1.2.5) via commands like <code>apko build-cpio</code> or through disk-backed consumers such as <code>melange</code>.</li>
<li>During tar extraction, the vulnerable <code>sanitizePath</code> function fails to properly resolve or refuse the malicious symlink.</li>
<li>A subsequent directory-creation or file-write operation is initiated within the same or a later archive entry.</li>
<li>The file operation traverses the previously created symbolic link, gaining access to the file system location outside the intended build root.</li>
<li>The attacker can then create directories or write files to the compromised location, potentially overwriting critical system files or injecting malicious code.</li>
<li>Successful exploitation can lead to privilege escalation and persistent compromise of the host system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to write files to arbitrary locations on the host system. This can lead to privilege escalation if the attacker can overwrite setuid binaries or modify system configuration files. It can also lead to persistent compromise of the system if the attacker injects malicious code into startup scripts or other system files. While the exact number of victims is unknown, any system running a vulnerable version of apko (prior to 1.2.5) or tools embedding vulnerable versions of <code>pkg/apk/fs</code>, such as melange, is potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade apko to version 1.2.5 or later. This version includes a fix that prevents path traversal vulnerabilities as described in the advisory and commit <a href="https://github.com/chainguard-dev/apko/commit/f5a96e1299ac81c7ea9441705ec467688086f442">f5a96e1</a>.</li>
<li>If upgrading is not immediately feasible, avoid consuming APKs from untrusted sources. However, note that this does not fully eliminate the risk.</li>
<li>Monitor file creation events in sensitive directories for unexpected activity, especially after processing <code>.apk</code> files.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>symlink</category><category>apko</category><category>vulnerability</category><category>CVE-2026-42574</category></item></channel></rss>