Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27884: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Pennyw0rth NetExec

0
Medium
VulnerabilityCVE-2026-27884cvecve-2026-27884cwe-22
Published: Thu Feb 26 2026 (02/26/2026, 00:39:15 UTC)
Source: CVE Database V5
Vendor/Project: Pennyw0rth
Product: NetExec

Description

CVE-2026-27884 is a path traversal vulnerability in Pennyw0rth NetExec versions prior to 1. 5. 1, specifically in the spider_plus module. This flaw allows an attacker to craft filenames with path traversal sequences (e. g. , .. /) on SMB shares, which spider_plus improperly handles when downloading files. As a result, arbitrary files on the local system can be overwritten or created outside the intended directory. Exploitation requires user interaction and network access but no authentication. The vulnerability is rated medium severity with a CVSS score of 5.

AI-Powered Analysis

AILast updated: 02/26/2026, 01:12:59 UTC

Technical Analysis

CVE-2026-27884 is a path traversal vulnerability classified under CWE-22 affecting Pennyw0rth's NetExec tool, a network execution utility. The vulnerability exists in the spider_plus module prior to version 1.5.1, which is responsible for crawling SMB shares and saving files locally. The flaw arises because spider_plus does not properly sanitize or restrict pathname inputs when creating output files and directories. Specifically, it fails to handle path traversal characters such as '../' embedded in filenames on Linux SMB shares. An attacker controlling or influencing the SMB share can craft filenames containing these sequences, causing spider_plus to write files outside the intended directory scope. This can lead to arbitrary file overwrite or creation on the host running spider_plus, potentially allowing an attacker to modify configuration files, inject malicious scripts, or disrupt system operations. The vulnerability requires the attacker to have network access to the SMB share and to trick or convince the user to run spider_plus with the DOWNLOAD=true option enabled, which triggers the file saving behavior. No authentication is required to exploit the SMB share itself, but user interaction is necessary to initiate the download. The issue has been patched in NetExec version 1.5.1. No public exploits have been reported yet, but the vulnerability poses a risk due to the potential for arbitrary file writes. The CVSS v3.1 score is 5.3 (medium), reflecting network attack vector, high attack complexity, no privileges required, user interaction required, unchanged scope, no confidentiality impact, high integrity impact, and no availability impact.

Potential Impact

The primary impact of this vulnerability is the ability for an attacker to overwrite or create arbitrary files on the system running the vulnerable NetExec spider_plus module. This can compromise system integrity by allowing modification of critical configuration files, insertion of malicious code, or disruption of normal operations. While confidentiality is not directly affected, integrity violations can lead to privilege escalation, persistence, or further compromise if the attacker can inject scripts or binaries executed by privileged processes. Availability impact is minimal as the vulnerability does not directly cause denial of service. The requirement for user interaction and the need to run spider_plus with DOWNLOAD=true limits the attack surface but does not eliminate risk, especially in environments where SMB shares are accessible and users may run the tool with unsafe options. Organizations relying on NetExec for network execution and SMB share crawling could face targeted attacks aiming to manipulate local files, potentially impacting operational security and trustworthiness of systems. The lack of known exploits reduces immediate risk but patching is critical to prevent future exploitation.

Mitigation Recommendations

1. Upgrade Pennyw0rth NetExec to version 1.5.1 or later, where the vulnerability is patched. 2. Until patching is possible, avoid running the spider_plus module with the DOWNLOAD=true option, especially against untrusted or external SMB shares. 3. Restrict access to SMB shares to trusted users and systems only, minimizing exposure to maliciously crafted filenames. 4. Implement strict input validation and sanitization on SMB shares if possible, preventing filenames with path traversal sequences. 5. Monitor logs and file system changes on systems running NetExec for unexpected file writes or modifications outside expected directories. 6. Employ application whitelisting and integrity monitoring to detect unauthorized file changes. 7. Educate users and administrators about the risks of running spider_plus with unsafe options and the importance of applying updates promptly. 8. Consider network segmentation to isolate systems running NetExec from untrusted SMB shares or networks. These steps go beyond generic advice by focusing on controlling the specific attack vector (SMB shares and spider_plus usage) and monitoring for exploitation signs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-24T15:19:29.716Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f9a40b7ef31ef0b7260fd

Added to database: 2/26/2026, 12:56:32 AM

Last enriched: 2/26/2026, 1:12:59 AM

Last updated: 2/26/2026, 2:18:40 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats