Cyber Posture

CVE-2026-0963

Critical

Published: 30 January 2026

Published
30 January 2026
Modified
26 February 2026
KEV Added
Patch
CVSS Score 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L
EPSS Score 0.0015 34.8th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-0963 is a critical-severity Path Traversal (CWE-22) vulnerability in Craftycontrol Crafty Controller. Its CVSS base score is 9.9 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 34.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the input neutralization failure by validating inputs to the File Operations API Endpoint to block path traversal exploits.

prevent

Enforces logical access controls on files to prevent unauthorized tampering and RCE resulting from path traversal.

prevent

Establishes processes to remediate the specific path traversal flaw in Crafty Controller, including applying documented patches.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is a CWE-22 path traversal in a network-accessible File Operations API endpoint (AV:N), enabling remote authenticated low-privilege attackers to perform file tampering and remote code execution with scope change, directly facilitating exploitation of a public-facing application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

An input neutralization vulnerability in the File Operations API Endpoint component of Crafty Controller allows a remote, authenticated attacker to perform file tampering and remote code execution via path traversal.

Deeper analysisAI

CVE-2026-0963 is an input neutralization vulnerability, classified under CWE-22 (path traversal), affecting the File Operations API Endpoint component of Crafty Controller. Published on 2026-01-30T07:16:15.173, it carries a CVSS v3.1 base score of 9.9 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L), indicating critical severity due to its potential for high-impact exploitation.

A remote, authenticated attacker with low privileges (PR:L) can exploit this vulnerability over the network with low attack complexity and no user interaction required. Successful exploitation enables file tampering and remote code execution, with the attack changing scope (S:C) to compromise high levels of confidentiality and integrity while causing low availability impact.

Details on mitigation, including any patches or workarounds, are documented in the primary advisory reference at https://gitlab.com/crafty-controller/crafty-4/-/issues/660.

Details

CWE(s)

Affected Products

craftycontrol
crafty controller
4.7.0

CVEs Like This One

CVE-2026-0805Same product: Craftycontrol Crafty Controller
CVE-2026-5652Same product: Craftycontrol Crafty Controller
CVE-2025-14700Same product: Craftycontrol Crafty Controller
CVE-2024-36512Shared CWE-22
CVE-2025-14727Shared CWE-22
CVE-2025-36236Shared CWE-22
CVE-2025-7360Shared CWE-22
CVE-2025-7712Shared CWE-22
CVE-2024-39786Shared CWE-22
CVE-2025-64057Shared CWE-22

References