Home

Description

An input neutralization vulnerability in the File Operations API Endpoint component of Crafty Controller allows a remote, authenticated attacker to perform file tampering and remote code execution via path traversal.

PUBLISHED Reserved 2026-01-14 | Published 2026-01-30 | Updated 2026-02-02 | Assigner GitLab




CRITICAL: 9.9CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

Default status
unaffected

4.7.0 (semver) before 4.8.0
affected

Credits

Thank you to [Rozza / rchar](https://gitlab.com/rchar) on GitLab for reporting this issue. finder

References

gitlab.com/crafty-controller/crafty-4/-/issues/660 (GitLab Issue #660) issue-tracking permissions-required

cve.org (CVE-2026-0963)

nvd.nist.gov (CVE-2026-0963)

Download JSON