Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30915: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in drakkan sftpgo

0
Medium
VulnerabilityCVE-2026-30915cvecve-2026-30915cwe-22
Published: Fri Mar 13 2026 (03/13/2026, 19:04:36 UTC)
Source: CVE Database V5
Vendor/Project: drakkan
Product: sftpgo

Description

SFTPGo is an open source, event-driven file transfer solution. SFTPGo versions before v2.7.1 contain an input validation issue in the handling of dynamic group paths, for example, home directories or key prefixes. When a group is configured with a dynamic home directory or key prefix using placeholders like %username%, the value replacing the placeholder is not strictly sanitized against relative path components. Consequently, if a user is created with a specially crafted username the resulting path may resolve to a parent directory instead of the intended sub-directory. This issue is fixed in version v2.7.1

AI-Powered Analysis

AILast updated: 03/13/2026, 19:44:51 UTC

Technical Analysis

SFTPGo is an open-source, event-driven file transfer server supporting SFTP and other protocols. Versions from 2.3.0 to before 2.7.1 contain a path traversal vulnerability (CWE-22) identified as CVE-2026-30915. The issue stems from insufficient sanitization of dynamic group path placeholders, such as %username%, used to define home directories or key prefixes. When a username includes relative path components (e.g., '../'), the resulting path can traverse outside the intended restricted directory, bypassing directory confinement controls. This improper limitation of pathname allows an attacker with the ability to create or control usernames to access or manipulate files outside their authorized directory scope. The vulnerability is remotely exploitable without authentication or user interaction, though it requires the attacker to have privileges to create or influence usernames. The CVSS 4.0 base score is 5.3 (medium), reflecting network attack vector, low complexity, no privileges required, and limited impact on confidentiality and integrity. No known exploits have been reported in the wild. The issue is resolved in SFTPGo version 2.7.1 by implementing stricter input validation and sanitization of dynamic path components to prevent directory traversal.

Potential Impact

This vulnerability can lead to unauthorized access or modification of files outside the designated user directories on SFTPGo servers, potentially exposing sensitive data or allowing tampering with system files. Organizations relying on SFTPGo for secure file transfers may face data confidentiality breaches and integrity violations. Attackers exploiting this flaw could bypass directory restrictions, leading to privilege escalation or lateral movement within the affected environment. Although the impact is limited by the need to create or control usernames, environments with automated user provisioning or weak user management policies are at higher risk. The vulnerability could disrupt secure file transfer operations and damage organizational trust in data handling. Since SFTPGo is used globally in various sectors, the threat affects any organization using vulnerable versions, especially those with internet-facing SFTPGo servers.

Mitigation Recommendations

The primary mitigation is to upgrade SFTPGo to version 2.7.1 or later, where the vulnerability is fixed. Until upgrading, organizations should enforce strict validation on usernames to disallow relative path components such as '../' or other directory traversal sequences. Implement input sanitization at the user creation stage to prevent malicious usernames. Restrict user creation privileges to trusted administrators and monitor logs for suspicious username patterns. Employ file system permissions and access controls to limit the impact of potential traversal attempts. Additionally, consider isolating SFTPGo instances in segmented network zones and use intrusion detection systems to detect anomalous file access patterns. Regularly audit SFTPGo configurations and user directories to ensure no unauthorized files are accessible outside intended paths.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-07T16:40:05.884Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b465b22f860ef9438da27e

Added to database: 3/13/2026, 7:29:54 PM

Last enriched: 3/13/2026, 7:44:51 PM

Last updated: 3/13/2026, 8:57:10 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses