๐Ÿ” CVE Alert

CVE-2026-32771

UNKNOWN 0.0

Monitoring is vulnerable to Archive Slip due to missing checks in sanitization

CVSS Score
0.0
EPSS Score
0.1%
EPSS Percentile
18th

The CTFer.io Monitoring component is in charge of the collection, process and storage of various signals (i.e. logs, metrics and distributed traces). In versions prior to 0.2.2, the sanitizeArchivePath function in pkg/extract/extract.go (lines 248โ€“254) is vulnerable to Path Traversal due to a missing trailing path separator in the strings.HasPrefix check. The extractor allows arbitrary file writes (e.g., overwriting shell configs, SSH keys, kubeconfig, or crontabs), enabling RCE and persistent backdoors. The attack surface is further amplified by the default ReadWriteMany PVC access mode, which lets any pod in the cluster inject a malicious payload. This issue has been fixed in version 0.2.2.

CWE CWE-22
Vendor ctfer-io
Product monitoring
Published Mar 20, 2026
Last Updated Mar 20, 2026
Stay Ahead of the Next One

Get instant alerts for ctfer-io monitoring

Be the first to know when new unknown vulnerabilities affecting ctfer-io monitoring are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

ctfer-io / monitoring
< 0.2.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/ctfer-io/monitoring/security/advisories/GHSA-f7cq-gvh6-qr25 github.com: https://github.com/ctfer-io/monitoring/commit/269dba165aa42210352628c0db6756f3b8fd3c8a security.snyk.io: https://security.snyk.io/research/zip-slip-vulnerability#expandable-socPI9fFAJ-title