CVE-2026-0963
Published: 30 January 2026
Summary
CVE-2026-0963 is a critical-severity Path Traversal (CWE-22) vulnerability in Craftycontrol Crafty Controller. Its CVSS base score is 9.9 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 34.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the input neutralization failure by validating inputs to the File Operations API Endpoint to block path traversal exploits.
Enforces logical access controls on files to prevent unauthorized tampering and RCE resulting from path traversal.
Establishes processes to remediate the specific path traversal flaw in Crafty Controller, including applying documented patches.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is a CWE-22 path traversal in a network-accessible File Operations API endpoint (AV:N), enabling remote authenticated low-privilege attackers to perform file tampering and remote code execution with scope change, directly facilitating exploitation of a public-facing application.
NVD Description
An input neutralization vulnerability in the File Operations API Endpoint component of Crafty Controller allows a remote, authenticated attacker to perform file tampering and remote code execution via path traversal.
Deeper analysisAI
CVE-2026-0963 is an input neutralization vulnerability, classified under CWE-22 (path traversal), affecting the File Operations API Endpoint component of Crafty Controller. Published on 2026-01-30T07:16:15.173, it carries a CVSS v3.1 base score of 9.9 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L), indicating critical severity due to its potential for high-impact exploitation.
A remote, authenticated attacker with low privileges (PR:L) can exploit this vulnerability over the network with low attack complexity and no user interaction required. Successful exploitation enables file tampering and remote code execution, with the attack changing scope (S:C) to compromise high levels of confidentiality and integrity while causing low availability impact.
Details on mitigation, including any patches or workarounds, are documented in the primary advisory reference at https://gitlab.com/crafty-controller/crafty-4/-/issues/660.
Details
- CWE(s)