CVE-2026-45230

DumbAssets · DumbAssets

DumbAssets contains a path traversal vulnerability in the file deletion API that allows unauthenticated attackers to delete arbitrary files, resulting in denial of service.

Executive summary

A critical path traversal vulnerability in DumbAssets allows unauthenticated attackers to delete essential system files, leading to a complete denial of service.

Vulnerability

The POST /api/delete-file endpoint fails to validate the filesToDelete array, allowing an attacker to use ../ sequences to traverse outside the intended directory and delete critical files like server.js.

Business impact

The CVSS score of 9.1 highlights the severity of this vulnerability. While it primarily results in a denial of service, the ability to delete arbitrary files can be used to disrupt critical business operations or potentially clear evidence of other malicious activities.

Remediation

Immediate Action: Update to the latest version of DumbAssets and check the vendor advisory for specific patch details.

Proactive Monitoring: Monitor API access logs for suspicious input patterns, specifically repeated use of directory traversal sequences.

Compensating Controls: Implement strict path validation and ensure the application runs with the minimum file system permissions required.

Exploitation status

Public Exploit Available: No