Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0805: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Arcadia Technology, LLC Crafty Controller

0
High
VulnerabilityCVE-2026-0805cvecve-2026-0805cwe-22
Published: Fri Jan 30 2026 (01/30/2026, 06:04:15 UTC)
Source: CVE Database V5
Vendor/Project: Arcadia Technology, LLC
Product: Crafty Controller

Description

CVE-2026-0805 is a high-severity path traversal vulnerability in Arcadia Technology's Crafty Controller version 4. 5. 0, specifically in its Backup Configuration component. It allows a remote attacker with low privileges and no user interaction to manipulate file paths, enabling file tampering and potentially remote code execution. The vulnerability requires authentication but can lead to a complete compromise of confidentiality and integrity, with no impact on availability. No public exploits are currently known. European organizations using Crafty Controller 4. 5. 0 are at risk, especially those in critical infrastructure or industrial automation sectors. Mitigation requires applying vendor patches once available, restricting access to the Backup Configuration interface, and implementing strict input validation and monitoring.

AI-Powered Analysis

AILast updated: 02/06/2026, 08:40:13 UTC

Technical Analysis

CVE-2026-0805 is a path traversal vulnerability categorized under CWE-22 found in the Backup Configuration component of Arcadia Technology, LLC's Crafty Controller product, version 4.5.0. This vulnerability arises from improper input neutralization, allowing an authenticated remote attacker with low privileges to manipulate file path inputs to access or modify files outside the intended directory scope. Exploitation can lead to file tampering and remote code execution (RCE), compromising system confidentiality and integrity. The vulnerability does not require user interaction but does require authentication, which lowers the attack complexity but still poses a significant risk. The CVSS v3.1 base score is 8.2, reflecting high severity due to the potential for complete data compromise and code execution. No public exploits are currently known, and no patches have been linked yet, indicating that organizations must monitor vendor communications closely. The vulnerability affects only version 4.5.0 of Crafty Controller, a product likely used in industrial or automation environments, where backup configuration is critical. The path traversal flaw allows attackers to escape restricted directories, potentially overwriting or injecting malicious files, leading to full system compromise. The vulnerability's scope is 'changed,' meaning it can affect resources beyond the initially vulnerable component, increasing risk. The attack vector is network-based, requiring authentication but no user interaction, making it feasible for insiders or compromised accounts to exploit.

Potential Impact

For European organizations, especially those in industrial automation, manufacturing, or critical infrastructure sectors using Crafty Controller 4.5.0, this vulnerability poses a significant risk. Successful exploitation can lead to unauthorized access to sensitive configuration files, tampering with backups, and remote code execution, potentially resulting in operational disruption, data breaches, and loss of system integrity. The confidentiality of sensitive operational data and intellectual property could be compromised. Integrity impacts include unauthorized modification of system files or configurations, which could lead to unsafe operational states or sabotage. Although availability is not directly impacted, the indirect effects of compromised systems could cause downtime or degraded performance. Given the high CVSS score and the ability to execute arbitrary code remotely, attackers could establish persistent footholds, escalate privileges, and move laterally within networks. The requirement for authentication limits exposure but does not eliminate risk, especially if credential theft or insider threats are present. European organizations with interconnected industrial control systems may face cascading effects if this vulnerability is exploited. The lack of known exploits provides a window for proactive mitigation but also means attackers may develop exploits in the future.

Mitigation Recommendations

1. Monitor Arcadia Technology's official channels for patches addressing CVE-2026-0805 and apply them immediately upon release. 2. Restrict access to the Backup Configuration component of Crafty Controller to trusted administrators only, using network segmentation and firewall rules to limit exposure. 3. Implement strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of compromised credentials being used to exploit this vulnerability. 4. Conduct thorough input validation and sanitization on all user-supplied data related to file paths within the application, if customization or internal controls are possible. 5. Regularly audit and monitor logs for unusual file access patterns or configuration changes indicative of exploitation attempts. 6. Employ application-layer firewalls or intrusion detection/prevention systems (IDS/IPS) capable of detecting path traversal attempts. 7. Educate system administrators about the risks of this vulnerability and the importance of credential security. 8. Consider isolating Crafty Controller instances in dedicated network zones to minimize lateral movement if compromised. 9. Perform regular backups and verify their integrity to enable recovery from tampering. 10. Review and harden system permissions to ensure the application runs with the least privilege necessary.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitLab
Date Reserved
2026-01-09T10:40:55.812Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697c4f63ac06320222326298

Added to database: 1/30/2026, 6:27:47 AM

Last enriched: 2/6/2026, 8:40:13 AM

Last updated: 2/7/2026, 7:59:13 AM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats