CVE-2026-0963

An input neutralization vulnerability in the File Operations API Endpoint component of Crafty Controller allows a remote, authenticated attacker to perform file tampering and remote code execution via path traversal.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:craftycontrol:crafty_controller:4.7.0:*:*:*:*:*:*:*

History

26 Feb 2026, 19:54

Type Values Removed Values Added
First Time Craftycontrol
Craftycontrol crafty Controller
CPE cpe:2.3:a:craftycontrol:crafty_controller:4.7.0:*:*:*:*:*:*:*
References () https://gitlab.com/crafty-controller/crafty-4/-/issues/660 - () https://gitlab.com/crafty-controller/crafty-4/-/issues/660 - Broken Link

04 Feb 2026, 16:34

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad de neutralización de entrada en el componente de punto final de la API de operaciones de archivo de Crafty Controller permite a un atacante remoto y autenticado realizar manipulación de archivos y ejecución remota de código a través de salto de ruta.

30 Jan 2026, 07:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-30 07:16

Updated : 2026-02-26 19:54


NVD link : CVE-2026-0963

Mitre link : CVE-2026-0963

CVE.ORG link : CVE-2026-0963


JSON object : View

Products Affected

craftycontrol

  • crafty_controller
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')