CVE-2026-30914
Published: 13 March 2026
Summary
CVE-2026-30914 is a high-severity Path Traversal (CWE-22) vulnerability in Sftpgo Project Sftpgo. Its CVSS base score is 8.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 6.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-25 (Reference Monitor) and AC-3 (Access Enforcement).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces approved authorizations for logical access to system resources, directly preventing authorization bypass via path normalization discrepancies in SFTPGo's Virtual Filesystem.
Validates file path inputs to block crafted paths that exploit path traversal and escape configured Virtual Folder boundaries.
Implements a tamper-proof reference monitor that mediates all resource accesses, ensuring protocol handlers and Virtual Filesystem routing cannot be bypassed.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Path traversal authz bypass in network-accessible SFTPGo service directly enables remote exploitation of public-facing app (T1190) to access/escape virtual folders for unauthorized local file reads (T1005) and directory enumeration (T1083).
NVD Description
SFTPGo is an open source, event-driven file transfer solution. In SFTPGo versions prior to 2.7.1, a path normalization discrepancy between the protocol handlers and the internal Virtual Filesystem routing can lead to an authorization bypass. An authenticated attacker can craft…
more
specific file paths to bypass folder-level permissions or escape the boundaries of a configured Virtual Folder. This vulnerability is fixed in 2.7.1.
Deeper analysisAI
CVE-2026-30914 is a path normalization discrepancy in SFTPGo, an open-source, event-driven file transfer solution, affecting versions prior to 2.7.1. The issue arises between protocol handlers and the internal Virtual Filesystem routing, leading to an authorization bypass classified as CWE-22 (Path Traversal). It carries a CVSS v3.1 base score of 8.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N), indicating high severity due to network accessibility, low attack complexity, and significant confidentiality and integrity impacts.
An authenticated attacker with low privileges (PR:L) can exploit this vulnerability remotely without user interaction. By crafting specific file paths, they bypass folder-level permissions or escape the boundaries of a configured Virtual Folder, potentially accessing or modifying unauthorized files.
The vulnerability is addressed in SFTPGo version 2.7.1. Additional details on the issue and mitigation are available in the GitHub security advisory at https://github.com/drakkan/sftpgo/security/advisories/GHSA-x8qh-7475-c5mp.
Details
- CWE(s)