CVE-2026-0963

Crafty · Crafty Controller

A critical vulnerability has been identified in Crafty Controller, a popular server management tool.

Executive summary

A critical vulnerability has been identified in Crafty Controller, a popular server management tool. This flaw, tracked as CVE-2026-0963, allows an authenticated remote attacker to bypass security restrictions and gain full control over the underlying server, enabling them to tamper with files and execute malicious code. Due to its high severity (CVSS 9.9), immediate remediation is required to prevent a complete system compromise.

Vulnerability

The vulnerability is an input neutralization flaw, specifically a path traversal, within the File Operations API Endpoint. An authenticated attacker can send a specially crafted request to this API containing directory traversal sequences (e.g., ../). The application fails to properly sanitize this input, allowing the attacker to navigate outside of the intended directory and access, modify, or create files anywhere on the server's filesystem with the permissions of the Crafty Controller service account. This can be leveraged for remote code execution by overwriting application scripts, configuration files, or system executables.

Business impact

This vulnerability is rated as critical severity with a CVSS score of 9.9. Successful exploitation could lead to a complete compromise of the server hosting Crafty Controller. The potential business impact is severe, including theft of sensitive data, deployment of ransomware, complete service disruption, and loss of system integrity. An attacker could use the compromised server as a pivot point to launch further attacks against the internal network, significantly expanding the scope of the breach and leading to substantial financial and reputational damage.

Remediation

Immediate Action: Update Crafty Controller to the latest version as recommended by the vendor. After patching, it is crucial to review access logs and system files for any signs of compromise that may have occurred prior to the update.

Proactive Monitoring: Monitor application and web server logs for suspicious requests to the File Operations API endpoint, specifically looking for patterns indicative of path traversal such as ../, ..\\, and their URL-encoded variants. Implement file integrity monitoring (FIM) to alert on unexpected changes to critical system files or application directories. Monitor for unusual outbound network connections from the server, which could indicate a successful compromise.

Compensating Controls: If immediate patching is not feasible, implement the following controls to reduce risk:

  • Deploy a Web Application Firewall (WAF) with rules specifically designed to detect and block path traversal attempts.
  • Restrict network access to the Crafty Controller management interface to only trusted IP addresses and administrative networks.
  • Run the Crafty Controller service with the lowest possible user privileges to limit the impact of a potential code execution exploit.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the critical CVSS score of 9.9, this vulnerability poses a direct and immediate threat to the confidentiality, integrity, and availability of affected systems. We strongly recommend that organizations identify all instances of Crafty Controller within their environment and apply the vendor-supplied patches without delay. If patching cannot be performed immediately, the compensating controls listed above should be implemented as a matter of urgency. Due to the high likelihood of future exploitation, this vulnerability should be prioritized at the highest level by all security and IT operations teams.