An input neutralization vulnerability in the File Operations API Endpoint component of Crafty Controller allows a remote, authenticated attacker to perform file tampering and remote code execution via path traversal.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
Upgrade to version 4.8.0
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://gitlab.com/crafty-controller/crafty-4/-/issues/660 |
|
History
Fri, 30 Jan 2026 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An input neutralization vulnerability in the File Operations API Endpoint component of Crafty Controller allows a remote, authenticated attacker to perform file tampering and remote code execution via path traversal. | |
| Title | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Crafty Controller | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitLab
Published:
Updated: 2026-01-30T06:04:05.503Z
Reserved: 2026-01-14T20:14:16.821Z
Link: CVE-2026-0963
No data.
Status : Received
Published: 2026-01-30T07:16:15.173
Modified: 2026-01-30T07:16:15.173
Link: CVE-2026-0963
No data.
OpenCVE Enrichment
No data.
Weaknesses