An input neutralization vulnerability in the File Operations API Endpoint component of Crafty Controller allows a remote, authenticated attacker to perform file tampering and remote code execution via path traversal.
References
| Link | Resource |
|---|---|
| https://gitlab.com/crafty-controller/crafty-4/-/issues/660 | Broken Link |
Configurations
History
26 Feb 2026, 19:54
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Craftycontrol
Craftycontrol crafty Controller |
|
| CPE | cpe:2.3:a:craftycontrol:crafty_controller:4.7.0:*:*:*:*:*:*:* | |
| References | () https://gitlab.com/crafty-controller/crafty-4/-/issues/660 - Broken Link |
04 Feb 2026, 16:34
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
30 Jan 2026, 07:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-30 07:16
Updated : 2026-02-26 19:54
NVD link : CVE-2026-0963
Mitre link : CVE-2026-0963
CVE.ORG link : CVE-2026-0963
JSON object : View
Products Affected
craftycontrol
- crafty_controller
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
