CVE-2026-30915: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in drakkan sftpgo
SFTPGo is an open source, event-driven file transfer solution. SFTPGo versions before v2.7.1 contain an input validation issue in the handling of dynamic group paths, for example, home directories or key prefixes. When a group is configured with a dynamic home directory or key prefix using placeholders like %username%, the value replacing the placeholder is not strictly sanitized against relative path components. Consequently, if a user is created with a specially crafted username the resulting path may resolve to a parent directory instead of the intended sub-directory. This issue is fixed in version v2.7.1
AI Analysis
Technical Summary
SFTPGo is an open-source, event-driven file transfer server supporting SFTP and other protocols. Versions from 2.3.0 to before 2.7.1 contain a path traversal vulnerability (CWE-22) identified as CVE-2026-30915. The issue stems from insufficient sanitization of dynamic group path placeholders, such as %username%, used to define home directories or key prefixes. When a username includes relative path components (e.g., '../'), the resulting path can traverse outside the intended restricted directory, bypassing directory confinement controls. This improper limitation of pathname allows an attacker with the ability to create or control usernames to access or manipulate files outside their authorized directory scope. The vulnerability is remotely exploitable without authentication or user interaction, though it requires the attacker to have privileges to create or influence usernames. The CVSS 4.0 base score is 5.3 (medium), reflecting network attack vector, low complexity, no privileges required, and limited impact on confidentiality and integrity. No known exploits have been reported in the wild. The issue is resolved in SFTPGo version 2.7.1 by implementing stricter input validation and sanitization of dynamic path components to prevent directory traversal.
Potential Impact
This vulnerability can lead to unauthorized access or modification of files outside the designated user directories on SFTPGo servers, potentially exposing sensitive data or allowing tampering with system files. Organizations relying on SFTPGo for secure file transfers may face data confidentiality breaches and integrity violations. Attackers exploiting this flaw could bypass directory restrictions, leading to privilege escalation or lateral movement within the affected environment. Although the impact is limited by the need to create or control usernames, environments with automated user provisioning or weak user management policies are at higher risk. The vulnerability could disrupt secure file transfer operations and damage organizational trust in data handling. Since SFTPGo is used globally in various sectors, the threat affects any organization using vulnerable versions, especially those with internet-facing SFTPGo servers.
Mitigation Recommendations
The primary mitigation is to upgrade SFTPGo to version 2.7.1 or later, where the vulnerability is fixed. Until upgrading, organizations should enforce strict validation on usernames to disallow relative path components such as '../' or other directory traversal sequences. Implement input sanitization at the user creation stage to prevent malicious usernames. Restrict user creation privileges to trusted administrators and monitor logs for suspicious username patterns. Employ file system permissions and access controls to limit the impact of potential traversal attempts. Additionally, consider isolating SFTPGo instances in segmented network zones and use intrusion detection systems to detect anomalous file access patterns. Regularly audit SFTPGo configurations and user directories to ensure no unauthorized files are accessible outside intended paths.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, Netherlands, Japan, South Korea, India
CVE-2026-30915: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in drakkan sftpgo
Description
SFTPGo is an open source, event-driven file transfer solution. SFTPGo versions before v2.7.1 contain an input validation issue in the handling of dynamic group paths, for example, home directories or key prefixes. When a group is configured with a dynamic home directory or key prefix using placeholders like %username%, the value replacing the placeholder is not strictly sanitized against relative path components. Consequently, if a user is created with a specially crafted username the resulting path may resolve to a parent directory instead of the intended sub-directory. This issue is fixed in version v2.7.1
AI-Powered Analysis
Technical Analysis
SFTPGo is an open-source, event-driven file transfer server supporting SFTP and other protocols. Versions from 2.3.0 to before 2.7.1 contain a path traversal vulnerability (CWE-22) identified as CVE-2026-30915. The issue stems from insufficient sanitization of dynamic group path placeholders, such as %username%, used to define home directories or key prefixes. When a username includes relative path components (e.g., '../'), the resulting path can traverse outside the intended restricted directory, bypassing directory confinement controls. This improper limitation of pathname allows an attacker with the ability to create or control usernames to access or manipulate files outside their authorized directory scope. The vulnerability is remotely exploitable without authentication or user interaction, though it requires the attacker to have privileges to create or influence usernames. The CVSS 4.0 base score is 5.3 (medium), reflecting network attack vector, low complexity, no privileges required, and limited impact on confidentiality and integrity. No known exploits have been reported in the wild. The issue is resolved in SFTPGo version 2.7.1 by implementing stricter input validation and sanitization of dynamic path components to prevent directory traversal.
Potential Impact
This vulnerability can lead to unauthorized access or modification of files outside the designated user directories on SFTPGo servers, potentially exposing sensitive data or allowing tampering with system files. Organizations relying on SFTPGo for secure file transfers may face data confidentiality breaches and integrity violations. Attackers exploiting this flaw could bypass directory restrictions, leading to privilege escalation or lateral movement within the affected environment. Although the impact is limited by the need to create or control usernames, environments with automated user provisioning or weak user management policies are at higher risk. The vulnerability could disrupt secure file transfer operations and damage organizational trust in data handling. Since SFTPGo is used globally in various sectors, the threat affects any organization using vulnerable versions, especially those with internet-facing SFTPGo servers.
Mitigation Recommendations
The primary mitigation is to upgrade SFTPGo to version 2.7.1 or later, where the vulnerability is fixed. Until upgrading, organizations should enforce strict validation on usernames to disallow relative path components such as '../' or other directory traversal sequences. Implement input sanitization at the user creation stage to prevent malicious usernames. Restrict user creation privileges to trusted administrators and monitor logs for suspicious username patterns. Employ file system permissions and access controls to limit the impact of potential traversal attempts. Additionally, consider isolating SFTPGo instances in segmented network zones and use intrusion detection systems to detect anomalous file access patterns. Regularly audit SFTPGo configurations and user directories to ensure no unauthorized files are accessible outside intended paths.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-07T16:40:05.884Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69b465b22f860ef9438da27e
Added to database: 3/13/2026, 7:29:54 PM
Last enriched: 3/13/2026, 7:44:51 PM
Last updated: 3/13/2026, 8:57:10 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.