Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-29522: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in ZwickRoell GmbH & Co. KG Test Data Management

0
High
VulnerabilityCVE-2026-29522cvecve-2026-29522cwe-22
Published: Mon Mar 16 2026 (03/16/2026, 20:46:49 UTC)
Source: CVE Database V5
Vendor/Project: ZwickRoell GmbH & Co. KG
Product: Test Data Management

Description

CVE-2026-29522 is a high-severity local file inclusion (LFI) vulnerability affecting ZwickRoell GmbH & Co. KG Test Data Management software versions prior to 3. 0. 8. The vulnerability exists in the /server/node_upgrade_srv. js endpoint, where an unauthenticated attacker can exploit improper pathname limitation (CWE-22) by supplying directory traversal sequences via the firmware parameter. This allows attackers to access arbitrary files on the server, leading to sensitive information disclosure. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network. Although no known exploits are currently reported in the wild, the CVSS 4. 0 base score of 8.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 01:05:48 UTC

Technical Analysis

CVE-2026-29522 is a local file inclusion vulnerability categorized under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory) found in ZwickRoell GmbH & Co. KG's Test Data Management software prior to version 3.0.8. The flaw resides in the /server/node_upgrade_srv.js endpoint, which processes a firmware parameter without proper sanitization or validation of directory traversal sequences (e.g., '../'). An unauthenticated attacker can craft requests that manipulate this parameter to traverse directories and access arbitrary files on the server's filesystem. This can lead to unauthorized disclosure of sensitive system files, configuration data, or credentials stored on the server. The vulnerability is remotely exploitable over the network without requiring any privileges or user interaction, increasing its risk profile. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no authentication required (AT:N), no user interaction (UI:N), and high impact on confidentiality (VC:H) with no impact on integrity or availability. No patches or exploits are currently publicly available, but the vulnerability's presence in a critical endpoint used for firmware upgrades makes it a significant threat to the confidentiality of affected systems. The vulnerability affects all versions prior to 3.0.8, and organizations using these versions should urgently apply updates or implement mitigations to prevent exploitation.

Potential Impact

The primary impact of CVE-2026-29522 is unauthorized disclosure of sensitive information due to local file inclusion via directory traversal. Attackers can access configuration files, credentials, logs, or other sensitive data stored on the server, potentially enabling further attacks such as privilege escalation or lateral movement. This compromises the confidentiality of the affected systems and may lead to intellectual property theft, exposure of personally identifiable information (PII), or disruption of business operations if sensitive operational data is leaked. Since the vulnerability requires no authentication and can be exploited remotely, it poses a significant risk to organizations using the affected software globally. The lack of known exploits in the wild currently reduces immediate risk, but the high CVSS score and ease of exploitation make it a critical issue that could be targeted by threat actors once exploit code becomes available. Industries relying on ZwickRoell Test Data Management for quality assurance and testing, especially in manufacturing, automotive, and materials testing sectors, are particularly at risk.

Mitigation Recommendations

1. Upgrade to ZwickRoell Test Data Management version 3.0.8 or later, where this vulnerability is fixed. 2. If immediate patching is not possible, implement network-level access controls to restrict access to the /server/node_upgrade_srv.js endpoint, limiting it to trusted internal IP addresses only. 3. Employ web application firewalls (WAFs) with custom rules to detect and block directory traversal patterns in the firmware parameter. 4. Conduct regular audits of server file permissions to ensure sensitive files are not accessible by the application user beyond what is necessary. 5. Monitor logs for suspicious requests containing directory traversal sequences targeting the vulnerable endpoint. 6. Implement strict input validation and sanitization on all parameters, especially those related to file paths, to prevent traversal attacks. 7. Isolate the Test Data Management server in a segmented network zone to reduce exposure. 8. Educate security teams about this vulnerability to enable rapid detection and response to potential exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-03-04T15:39:26.873Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b86eef771bdb1749567832

Added to database: 3/16/2026, 8:58:23 PM

Last enriched: 3/24/2026, 1:05:48 AM

Last updated: 4/30/2026, 3:16:38 PM

Views: 110

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses