CVE-2026-0963
Published: 30 January 2026
Description
An input neutralization vulnerability in the File Operations API Endpoint component of Crafty Controller allows a remote, authenticated attacker to perform file tampering and remote code execution via path traversal.
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the input neutralization failure by validating inputs to the File Operations API Endpoint to block path traversal exploits.
Enforces logical access controls on files to prevent unauthorized tampering and RCE resulting from path traversal.
Establishes processes to remediate the specific path traversal flaw in Crafty Controller, including applying documented patches.
Security SummaryAI
CVE-2026-0963 is an input neutralization vulnerability, classified under CWE-22 (path traversal), affecting the File Operations API Endpoint component of Crafty Controller. Published on 2026-01-30T07:16:15.173, it carries a CVSS v3.1 base score of 9.9 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L), indicating critical severity due to its potential for high-impact exploitation.
A remote, authenticated attacker with low privileges (PR:L) can exploit this vulnerability over the network with low attack complexity and no user interaction required. Successful exploitation enables file tampering and remote code execution, with the attack changing scope (S:C) to compromise high levels of confidentiality and integrity while causing low availability impact.
Details on mitigation, including any patches or workarounds, are documented in the primary advisory reference at https://gitlab.com/crafty-controller/crafty-4/-/issues/660.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is a CWE-22 path traversal in a network-accessible File Operations API endpoint (AV:N), enabling remote authenticated low-privilege attackers to perform file tampering and remote code execution with scope change, directly facilitating exploitation of a public-facing application.