Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2551: Path Traversal in ZenTao

0
Medium
VulnerabilityCVE-2026-2551cvecve-2026-2551
Published: Mon Feb 16 2026 (02/16/2026, 10:32:07 UTC)
Source: CVE Database V5
Product: ZenTao

Description

A vulnerability was determined in ZenTao up to 21.7.8. Affected by this vulnerability is the function delete of the file editor/control.php of the component Backup Handler. This manipulation of the argument fileName causes path traversal. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 21:20:48 UTC

Technical Analysis

CVE-2026-2551 is a path traversal vulnerability identified in the ZenTao project management software, affecting versions 21.7.0 through 21.7.8. The flaw exists in the delete function of the editor/control.php file within the Backup Handler component. The vulnerability stems from insufficient validation or sanitization of the fileName parameter, which an attacker can manipulate to traverse directories and specify arbitrary file paths. This allows remote attackers to delete files outside the intended directory scope, potentially leading to loss of critical files or disruption of service. The attack vector is network-based with no user interaction required, and the attacker needs only low privileges, making exploitation relatively straightforward. The vulnerability has been publicly disclosed, though no active exploitation in the wild has been reported yet. The CVSS 4.0 base score of 5.3 indicates a medium severity, reflecting moderate impacts on confidentiality, integrity, and availability, with no requirement for authentication or user interaction. The vulnerability's scope is limited to affected ZenTao versions, which are used primarily in software development and project management environments.

Potential Impact

The primary impact of CVE-2026-2551 is unauthorized deletion of files on systems running vulnerable versions of ZenTao. This can lead to data loss, disruption of backup processes, and potential denial of service if critical files are removed. The integrity of project management data and backups may be compromised, affecting organizational workflows and software development lifecycles. Confidentiality impact is limited but possible if deletion of security or configuration files leads to further exploitation. The ease of exploitation and remote attack vector increase the risk of widespread abuse, especially in environments where ZenTao is exposed to untrusted networks. Organizations relying on ZenTao for project tracking and backup management may face operational disruptions and increased recovery costs. The absence of known exploits in the wild currently limits immediate risk, but public disclosure raises the likelihood of future attacks.

Mitigation Recommendations

To mitigate CVE-2026-2551, organizations should immediately upgrade ZenTao to a version where this vulnerability is patched once available. In the absence of an official patch, implement input validation and sanitization on the fileName parameter within the Backup Handler's delete function to prevent directory traversal sequences such as '../'. Restrict file deletion operations to a predefined safe directory using canonicalization techniques to ensure paths do not escape intended boundaries. Employ web application firewalls (WAFs) with rules to detect and block path traversal attempts targeting the vulnerable endpoint. Limit network exposure of ZenTao instances by placing them behind VPNs or internal networks and restrict access to trusted users only. Regularly back up critical data and verify backup integrity to enable recovery from unauthorized deletions. Monitor logs for suspicious file deletion requests and anomalous activity related to the editor/control.php endpoint. Conduct security assessments and code reviews on custom ZenTao deployments to identify similar vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-15T16:20:18.187Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6992f627bda29fb02f6786e0

Added to database: 2/16/2026, 10:49:11 AM

Last enriched: 2/23/2026, 9:20:48 PM

Last updated: 4/6/2026, 7:46:04 AM

Views: 143

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses