CVE-2026-35174
Published: 06 April 2026
Description
Chyrp Lite is an ultra-lightweight blogging engine. Prior to 2026.01, a path traversal vulnerability exists in the administration console that allows an administrator or a user with Change Settings permission to change the uploads path to any folder. This vulnerability…
more
allows the user to download any file on the server, including config.json.php with database credentials and overwrite critical system files, leading to remote code execution. This vulnerability is fixed in 2026.01.
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses path traversal by requiring validation of user-supplied inputs like the uploads path to reject invalid traversals.
Ensures timely remediation of flaws like CVE-2026-35174 through identification, reporting, testing, and patching to version 2026.01.
Enforces least privilege to restrict Change Settings permission to only necessary users, preventing exploitation by malicious administrators or permitted users.
Security SummaryAI
CVE-2026-35174 is a path traversal vulnerability in Chyrp Lite, an ultra-lightweight blogging engine. The issue resides in the administration console, where versions prior to 2026.01 allow an administrator or a user with Change Settings permission to modify the uploads path to arbitrary directories on the server. This flaw, associated with CWE-22 (Path Traversal), CWE-73 (External Control of File Name or Path), and CWE-434 (Unrestricted Upload of File with Dangerous Type), enables unauthorized file access and manipulation, with a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
An attacker with administrator privileges or Change Settings permission can exploit this vulnerability remotely over the network with low complexity. By altering the uploads path, they can download sensitive files such as config.json.php containing database credentials, and overwrite critical system files, potentially achieving remote code execution on the server.
The vulnerability is addressed in Chyrp Lite version 2026.01. Security practitioners should upgrade to this patched release immediately, as detailed in the GitHub Security Advisory at https://github.com/xenocrat/chyrp-lite/security/advisories/GHSA-p6pf-2grm-8257.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Path traversal in public-facing web app (T1190) enables arbitrary file read (T1083, T1005), credential theft from config files (T1552.001), and web shell deployment for RCE (T1100).