Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2552: Path Traversal in ZenTao

0
Medium
VulnerabilityCVE-2026-2552cvecve-2026-2552
Published: Mon Feb 16 2026 (02/16/2026, 11:02:05 UTC)
Source: CVE Database V5
Product: ZenTao

Description

A vulnerability was identified in ZenTao up to 21.7.8. Affected by this issue is the function delete of the file editor/control.php of the component Committer. Such manipulation of the argument filePath leads to path traversal. Upgrading to version 21.7.9 can resolve this issue. The affected component should be upgraded.

AI-Powered Analysis

AILast updated: 02/16/2026, 11:33:29 UTC

Technical Analysis

CVE-2026-2552 is a path traversal vulnerability identified in the ZenTao project management software, specifically in the delete function of the editor/control.php file within the Committer component. This vulnerability arises from improper validation of the filePath parameter, which an authenticated user with low privileges can manipulate to traverse directories and potentially delete or access files outside the intended scope. The vulnerability affects all ZenTao versions from 21.7.0 through 21.7.8. The attack vector is adjacent network (AV:A), requiring low attack complexity (AC:L), no user interaction (UI:N), and privileges at the low level (PR:L). The impact affects confidentiality, integrity, and availability to a low degree, as indicated by the CVSS 5.1 score. The vulnerability does not require special authentication tokens or user interaction, making it easier to exploit once credentials are obtained. No known exploits have been reported in the wild yet. The issue is resolved by upgrading to ZenTao version 21.7.9, which includes proper input validation and sanitization to prevent path traversal. The vulnerability could allow attackers to delete critical files or access sensitive data, potentially disrupting project management workflows or exposing confidential information.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized deletion or access of files on servers running vulnerable ZenTao versions, impacting project management data integrity and availability. Confidential project details, source code, or configuration files could be exposed or tampered with, potentially causing operational disruptions and intellectual property loss. Organizations relying heavily on ZenTao for software development lifecycle management may face increased risk of insider threats or credential compromise leading to exploitation. The medium severity rating reflects moderate impact potential, but the ease of exploitation with low privileges and no user interaction increases risk. Disruptions could affect compliance with data protection regulations such as GDPR if sensitive personal data is involved. Recovery efforts may require restoring files from backups and conducting forensic investigations, increasing operational costs.

Mitigation Recommendations

European organizations should immediately upgrade all ZenTao instances to version 21.7.9 or later to remediate the vulnerability. In addition to patching, implement strict access controls to limit user privileges to the minimum necessary, reducing the risk of exploitation by low-privilege users. Monitor logs for unusual file deletion or access patterns within the Committer component. Employ network segmentation to restrict access to ZenTao servers and enforce multi-factor authentication to reduce the risk of credential compromise. Conduct regular security audits and vulnerability scans focusing on web application input validation. Backup critical project data frequently and verify backup integrity to enable rapid recovery. Educate developers and administrators about secure coding and configuration practices to prevent similar issues. Consider deploying web application firewalls (WAFs) with custom rules to detect and block path traversal attempts until patches are applied.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-15T16:20:21.100Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6992fd2fbda29fb02f6aa184

Added to database: 2/16/2026, 11:19:11 AM

Last enriched: 2/16/2026, 11:33:29 AM

Last updated: 2/16/2026, 2:04:06 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats