PT-2026-28741 · Unknown · Api/V2/Files
Published
2026-03-27
·
Updated
2026-03-27
·
CVE-2026-5027
CVSS v3.1
8.8
High
| AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
versions prior to 2026-5027
Description
The 'POST /api/v2/files' endpoint does not sanitize the
filename parameter received through multipart form data. This allows an attacker to utilize path traversal sequences, such as '../', to write files to arbitrary locations on the filesystem. The filename parameter is the point of entry for this issue.Recommendations
Sanitize the
filename parameter in the 'POST /api/v2/files' endpoint to prevent path traversal attacks.Fix
Path traversal
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Api/V2/Files