Cyber Posture

CVE-2026-2753

High

Published: 06 March 2026

Published
06 March 2026
Modified
10 March 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0009 26.0th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-2753 is a high-severity Absolute Path Traversal (CWE-36) vulnerability in Cydome (inferred from references). Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 26.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

The path traversal in the unauthenticated public HTTP service directly enables remote file retrieval from the local filesystem (T1005) via exploitation of a public-facing application (T1190).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

An Absolute Path Traversal vulnerability exists in Navtor NavBox. The application exposes an HTTP service that fails to properly sanitize user-supplied path input. Unauthenticated remote attackers can exploit this issue by submitting requests containing absolute filesystem paths. Successful exploitation allows…

more

the attacker to retrieve arbitrary files from the underlying filesystem, limited only by the privileges of the service process. This can lead to the exposure of sensitive configuration files and system information.

Deeper analysisAI

CVE-2026-2753 is an absolute path traversal vulnerability (CWE-36) affecting Navtor NavBox, specifically version 4.12.0.3. The application exposes an HTTP service that fails to properly sanitize user-supplied path input, allowing attackers to traverse the filesystem using absolute paths. It has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high confidentiality impact with no requirements for authentication, privileges, or user interaction.

Unauthenticated remote attackers can exploit this vulnerability by submitting crafted HTTP requests containing absolute filesystem paths. Successful exploitation enables retrieval of arbitrary files from the underlying filesystem, constrained only by the privileges of the service process. This can result in the exposure of sensitive configuration files and system information.

Mitigation details are available in advisories from Cydome at https://cydome.io/vulnerability-advisory-cve-2026-2753-in-navtor-navbox-version-4-12-0-3 and the Navtor vendor statement at https://www.navtor.com/navtor-vendor-statement.

Details

CWE(s)

Affected Products

Cydome
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-1330Shared CWE-36
CVE-2026-0846Shared CWE-36
CVE-2026-4373Shared CWE-36
CVE-2026-28414Shared CWE-36
CVE-2025-57790Shared CWE-36
CVE-2024-13159Shared CWE-36
CVE-2026-1018Shared CWE-36
CVE-2024-8501Shared CWE-36
CVE-2025-7846Shared CWE-36
CVE-2025-34392Shared CWE-36

References