PT-2026-34592 · Psi 4Ward · Psitransfer
Published
2026-04-23
·
Updated
2026-04-23
·
CVE-2026-41180
CVSS v3.1
7.5
High
| AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H |
PsiTransfer is an open source, self-hosted file sharing solution. Prior to version 2.4.3, the upload PATCH flow under
/files/:uploadId validates the mounted request path using the still-encoded req.path, but the downstream tus handler later writes using the decoded req.params.uploadId. In deployments that use a supported custom PSITRANSFER UPLOAD DIR whose basename prefixes a startup-loaded JavaScript path, such as conf, an unauthenticated attacker can create config.<NODE ENV>.js in the application root. The attacker-controlled file is then executed on the next process restart. Version 2.4.3 contains a patch.Fix
Path traversal
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Psitransfer