CVE-2026-5027

Unknown · Unknown (API Service)

The 'POST /api/v2/files' endpoint fails to sanitize the 'filename' parameter, allowing unauthenticated path traversal and arbitrary file writes.

Executive summary

An unauthenticated path traversal vulnerability in the /api/v2/files endpoint allows attackers to write files to arbitrary locations on the filesystem, potentially leading to system takeover.

Vulnerability

The application's file upload API does not sanitize the filename parameter within multipart form data. An unauthenticated attacker can use path traversal sequences (e.g., ../) to bypass the intended upload directory and write files anywhere the application has permissions.

Business impact

This vulnerability is high-severity (CVSS 8.8) because it can be used to overwrite critical system files or upload a web shell into a web-accessible directory. This leads directly to remote code execution and full system compromise.

Remediation

Immediate Action: Apply the vendor-provided security updates immediately. If no update is available, implement strict input validation on the filename parameter to strip path traversal sequences.

Proactive Monitoring: Monitor the filesystem for the creation of unexpected files, especially in system or web-root directories, and audit logs for POST requests to /api/v2/files containing ../ sequences.

Compensating Controls: Ensure the application process runs with the least privilege necessary, preventing it from writing to sensitive system directories.

Exploitation status

Public Exploit Available: false

Analyst recommendation

The ability to write arbitrary files to a server is a critical security failure. Administrators must prioritize the application of patches for this API service and verify that the fix correctly handles all variants of path traversal characters.