CVE-2026-5027
Unknown · Unknown (API Service)
The 'POST /api/v2/files' endpoint fails to sanitize the 'filename' parameter, allowing unauthenticated path traversal and arbitrary file writes.
Executive summary
An unauthenticated path traversal vulnerability in the /api/v2/files endpoint allows attackers to write files to arbitrary locations on the filesystem, potentially leading to system takeover.
Vulnerability
The application's file upload API does not sanitize the filename parameter within multipart form data. An unauthenticated attacker can use path traversal sequences (e.g., ../) to bypass the intended upload directory and write files anywhere the application has permissions.
Business impact
This vulnerability is high-severity (CVSS 8.8) because it can be used to overwrite critical system files or upload a web shell into a web-accessible directory. This leads directly to remote code execution and full system compromise.
Remediation
Immediate Action: Apply the vendor-provided security updates immediately. If no update is available, implement strict input validation on the filename parameter to strip path traversal sequences.
Proactive Monitoring: Monitor the filesystem for the creation of unexpected files, especially in system or web-root directories, and audit logs for POST requests to /api/v2/files containing ../ sequences.
Compensating Controls: Ensure the application process runs with the least privilege necessary, preventing it from writing to sensitive system directories.
Exploitation status
Public Exploit Available: false
Analyst recommendation
The ability to write arbitrary files to a server is a critical security failure. Administrators must prioritize the application of patches for this API service and verify that the fix correctly handles all variants of path traversal characters.