Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27884: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Pennyw0rth NetExec

0
Medium
VulnerabilityCVE-2026-27884cvecve-2026-27884cwe-22
Published: Thu Feb 26 2026 (02/26/2026, 00:39:15 UTC)
Source: CVE Database V5
Vendor/Project: Pennyw0rth
Product: NetExec

Description

NetExec is a network execution tool. Prior to version 1.5.1, the module spider_plus improperly creates the output file and folder path when saving files from SMB shares. It does not take into account that it is possible for Linux SMB shares to have path traversal characters such as `../` in them. An attacker can craft a filename in an SMB share that includes these characters, which when spider_plus crawls and downloads, can write or overwrite arbitrary files. The issue is patched in v1.5.1. As a workaround, do not run spider_plus with DOWNLOAD=true against targets.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/05/2026, 11:14:39 UTC

Technical Analysis

CVE-2026-27884 is a medium-severity path traversal vulnerability identified in the Pennyw0rth NetExec tool, a network execution utility widely used for automated SMB share crawling and file retrieval. The vulnerability exists in the spider_plus module prior to version 1.5.1, where the software improperly handles output file and folder paths when saving files downloaded from SMB shares. Specifically, the module does not sanitize or restrict pathname components that include traversal sequences such as '../', which are valid in Linux SMB shares. An attacker with control over filenames on an SMB share can embed these traversal characters to manipulate the destination path on the local filesystem where spider_plus saves files. This manipulation allows writing or overwriting arbitrary files outside the intended directory, potentially leading to unauthorized modification of critical files. The vulnerability requires the spider_plus module to be run with DOWNLOAD=true, and exploitation involves user interaction as the tool must be directed to crawl the malicious SMB share. The CVSS 3.1 base score is 5.3, reflecting network attack vector, high attack complexity, no privileges required, and user interaction needed. The impact is limited to integrity, with no direct confidentiality or availability effects. No public exploits have been reported, and the vendor has addressed the issue in version 1.5.1. As a workaround, users are advised not to run spider_plus with DOWNLOAD=true against untrusted SMB shares until patched.

Potential Impact

The primary impact of CVE-2026-27884 is the unauthorized modification or overwriting of files on systems running vulnerable versions of NetExec when spider_plus is used to download files from SMB shares. This can lead to integrity violations, such as replacing configuration files, scripts, or binaries, potentially enabling further compromise or disruption of operations. While confidentiality and availability are not directly affected, the ability to alter files arbitrarily can facilitate privilege escalation, persistence, or sabotage. Organizations relying on NetExec for automated SMB crawling and file retrieval are at risk, especially if they interact with untrusted or external SMB shares. The attack complexity is high due to the need for user interaction and specific configuration, which somewhat limits widespread exploitation. However, targeted attacks against organizations using vulnerable versions could result in significant operational and security consequences. The lack of known exploits in the wild suggests limited current exploitation but does not preclude future attacks once the vulnerability is publicly known.

Mitigation Recommendations

To mitigate CVE-2026-27884, organizations should immediately upgrade Pennyw0rth NetExec to version 1.5.1 or later, where the vulnerability has been patched. Until patching is possible, avoid running the spider_plus module with DOWNLOAD=true against SMB shares, especially those that are untrusted or external. Implement strict access controls and monitoring on SMB shares to prevent attackers from placing malicious filenames containing path traversal sequences. Employ network segmentation to limit exposure of NetExec systems to potentially hostile SMB shares. Additionally, consider auditing and restricting the directories where spider_plus saves files to prevent unauthorized file overwrites. Monitoring file integrity on systems running NetExec can help detect suspicious modifications. Finally, educate users and administrators about the risks of running automated SMB crawlers against untrusted sources and enforce policies to reduce risky configurations.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-24T15:19:29.716Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f9a40b7ef31ef0b7260fd

Added to database: 2/26/2026, 12:56:32 AM

Last enriched: 3/5/2026, 11:14:39 AM

Last updated: 4/12/2026, 3:08:50 AM

Views: 332

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses