CVE-2026-41180

PsiTransfer is an open source, self-hosted file sharing solution. Prior to version 2.4.3, the upload PATCH flow under `/files/:uploadId` validates the mounted request path using the still-encoded `req.path`, but the downstream tus handler later writes using the decoded `req.params.uploadId`. In deployments that use a supported custom `PSITRANSFER_UPLOAD_DIR` whose basename prefixes a startup-loaded JavaScript path, such as `conf`, an unauthenticated attacker can create `config.<NODE_ENV>.js` in the application root. The attacker-controlled file is then executed on the next process restart. Version 2.4.3 contains a patch.
Configurations

No configuration.

History

23 Apr 2026, 15:37

Type Values Removed Values Added
References () https://github.com/psi-4ward/psitransfer/security/advisories/GHSA-533q-w4g6-5586 - () https://github.com/psi-4ward/psitransfer/security/advisories/GHSA-533q-w4g6-5586 -

23 Apr 2026, 02:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-23 02:16

Updated : 2026-04-29 21:08


NVD link : CVE-2026-41180

Mitre link : CVE-2026-41180

CVE.ORG link : CVE-2026-41180


JSON object : View

Products Affected

No product.

CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')