Cyber Posture

CVE-2026-24741

HighPublic PoC

Published: 27 January 2026

Published
27 January 2026
Modified
12 February 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
EPSS Score 0.0013 31.9th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

ConvertXis a self-hosted online file converter. In versions prior to 0.17.0, the `POST /delete` endpoint uses a user-controlled `filename` value to construct a filesystem path and deletes it via `unlink` without sufficient validation. By supplying path traversal sequences (e.g., `../`),…

more

an attacker can delete arbitrary files outside the intended uploads directory, limited only by the permissions of the server process. Version 0.17.0 fixes the issue.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires validation of the user-controlled filename parameter in the POST /delete endpoint to prevent path traversal sequences like '../' from enabling arbitrary file deletions.

prevent

Enforces access control policies to restrict file deletion operations to only authorized paths within the intended uploads directory, blocking traversal-based unauthorized access.

prevent

Limits server process privileges to the minimum necessary, reducing the scope of files that can be deleted via path traversal to mitigate integrity and availability impacts.

Security SummaryAI

ConvertX, a self-hosted online file converter, is affected by CVE-2026-24741 in versions prior to 0.17.0. The vulnerability resides in the POST /delete endpoint, which constructs a filesystem path using a user-controlled filename parameter and deletes the file via the unlink function without adequate validation. This enables path traversal attacks, such as supplying sequences like "../", allowing deletion of arbitrary files outside the intended uploads directory. The issue is classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory) with a CVSS v3.1 base score of 8.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H).

An authenticated attacker with low privileges (PR:L) can exploit this over the network (AV:N) with low complexity and no user interaction required. By crafting a malicious filename in the POST request, the attacker can traverse directories and delete sensitive files on the server, such as configuration files, logs, or other critical data. The impact is confined to the permissions of the server process, resulting in high integrity (I:H) and availability (A:H) damage but no confidentiality loss (C:N).

The GitHub security advisory (GHSA-w372-w6cr-45jp) and fixing commit (7a936bdc0463936463616381ca257b13babc5e77) confirm that upgrading to version 0.17.0 resolves the issue through improved path validation in the delete endpoint. Security practitioners should prioritize patching affected ConvertX instances and review access controls for the delete functionality to mitigate risks from privileged users.

Details

CWE(s)

Affected Products

c4illin
convertx
≤ 0.17.0

MITRE ATT&CK Enterprise TechniquesAI

T1070.004 File Deletion Stealth
Adversaries may delete files left behind by the actions of their intrusion activity.
T1561.001 Disk Content Wipe Impact
Adversaries may erase the contents of storage devices on specific systems or in large numbers in a network to interrupt availability to system and network resources.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Path traversal in delete endpoint enables arbitrary file deletion outside intended directory, directly facilitating T1070.004 (File Deletion) for indicator removal, T1561.001 (Disk Content Wipe) for data destruction/denial of access, and T1068 (Exploitation for Privilege Escalation) as low-privilege authenticated users can delete high-value files accessible only to the server process.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References