An input neutralization vulnerability in the File Operations API Endpoint component of Crafty Controller allows a remote, authenticated attacker to perform file tampering and remote code execution via path traversal.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://gitlab.com/crafty-controller/crafty-4/-/issues/660 |
|
History
Tue, 03 Feb 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Arcadia Technology
Arcadia Technology crafty Controller |
|
| Vendors & Products |
Arcadia Technology
Arcadia Technology crafty Controller |
Mon, 02 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 30 Jan 2026 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An input neutralization vulnerability in the File Operations API Endpoint component of Crafty Controller allows a remote, authenticated attacker to perform file tampering and remote code execution via path traversal. | |
| Title | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Crafty Controller | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitLab
Published: 2026-01-30T06:04:05.503Z
Updated: 2026-02-02T16:33:26.381Z
Reserved: 2026-01-14T20:14:16.821Z
Link: CVE-2026-0963
Updated: 2026-01-30T14:24:10.232Z
Status : Received
Published: 2026-01-30T07:16:15.173
Modified: 2026-01-30T07:16:15.173
Link: CVE-2026-0963
No data.