Cyber Posture

CVE-2026-0963

Critical

Published: 30 January 2026

Published
30 January 2026
Modified
26 February 2026
KEV Added
Patch
CVSS Score 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L
EPSS Score 0.0015 34.8th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

An input neutralization vulnerability in the File Operations API Endpoint component of Crafty Controller allows a remote, authenticated attacker to perform file tampering and remote code execution via path traversal.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the input neutralization failure by validating inputs to the File Operations API Endpoint to block path traversal exploits.

prevent

Enforces logical access controls on files to prevent unauthorized tampering and RCE resulting from path traversal.

prevent

Establishes processes to remediate the specific path traversal flaw in Crafty Controller, including applying documented patches.

Security SummaryAI

CVE-2026-0963 is an input neutralization vulnerability, classified under CWE-22 (path traversal), affecting the File Operations API Endpoint component of Crafty Controller. Published on 2026-01-30T07:16:15.173, it carries a CVSS v3.1 base score of 9.9 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L), indicating critical severity due to its potential for high-impact exploitation.

A remote, authenticated attacker with low privileges (PR:L) can exploit this vulnerability over the network with low attack complexity and no user interaction required. Successful exploitation enables file tampering and remote code execution, with the attack changing scope (S:C) to compromise high levels of confidentiality and integrity while causing low availability impact.

Details on mitigation, including any patches or workarounds, are documented in the primary advisory reference at https://gitlab.com/crafty-controller/crafty-4/-/issues/660.

Details

CWE(s)

Affected Products

craftycontrol
crafty controller
4.7.0

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is a CWE-22 path traversal in a network-accessible File Operations API endpoint (AV:N), enabling remote authenticated low-privilege attackers to perform file tampering and remote code execution with scope change, directly facilitating exploitation of a public-facing application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References