<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Home-Assistant — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/home-assistant/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 16 May 2026 16:19:57 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/home-assistant/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2021-47942: Home Assistant Community Store (HACS) Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-hacs-path-traversal/</link><pubDate>Sat, 16 May 2026 16:19:57 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-hacs-path-traversal/</guid><description>Home Assistant Community Store (HACS) 1.10.0 is vulnerable to a path traversal, allowing unauthenticated attackers to read sensitive files by traversing directories via the /hacsfiles/ endpoint, leading to potential account takeover.</description><content:encoded><![CDATA[<p>Home Assistant Community Store (HACS) version 1.10.0 contains a path traversal vulnerability, identified as CVE-2021-47942, which enables unauthenticated attackers to read arbitrary sensitive files on the system. The vulnerability resides in the <code>/hacsfiles/</code> endpoint, which lacks proper input validation, allowing directory traversal. Successful exploitation grants attackers access to sensitive files such as <code>.storage/auth</code>, which contains user credentials and refresh tokens. This allows attackers to craft valid JWT tokens and gain administrative access to Home Assistant instances, potentially compromising the entire smart home ecosystem managed by the affected instance. The vulnerability was reported in May 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a crafted HTTP request to the <code>/hacsfiles/</code> endpoint with a path traversal sequence in the URL.</li>
<li>The vulnerable application fails to properly sanitize the input, allowing the attacker to traverse the file system.</li>
<li>The attacker targets the <code>.storage/auth</code> file, which contains sensitive user credentials and refresh tokens.</li>
<li>The application reads and returns the contents of the targeted file to the attacker.</li>
<li>The attacker extracts user credentials and refresh tokens from the obtained <code>.storage/auth</code> file.</li>
<li>The attacker uses the extracted information to craft valid JWT tokens.</li>
<li>The attacker authenticates to the Home Assistant instance using the crafted JWT tokens.</li>
<li>The attacker gains administrative access to the Home Assistant instance, allowing full control over connected devices and configurations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthenticated attackers to gain administrative control over Home Assistant instances. This can lead to unauthorized access to and manipulation of connected smart home devices, exposure of sensitive user data, and potential disruption of home automation systems. The impact ranges from privacy violations and service disruption to complete compromise of the affected smart home environment. Given the widespread use of Home Assistant, a successful attack could affect a significant number of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect HACS Path Traversal Attempt</code> to detect requests with path traversal sequences targeting the <code>/hacsfiles/</code> endpoint.</li>
<li>Apply input validation and sanitization to the <code>/hacsfiles/</code> endpoint to prevent directory traversal attacks, addressing CVE-2021-47942.</li>
<li>Monitor web server logs for suspicious activity related to the <code>/hacsfiles/</code> endpoint, as logged by the &ldquo;webserver&rdquo; category.</li>
<li>Upgrade to a patched version of Home Assistant Community Store (HACS) that addresses the path traversal vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>path-traversal</category><category>account-takeover</category><category>hacs</category><category>cve-2021-47942</category></item></channel></rss>