๐Ÿ” CVE Alert

CVE-2026-41180

HIGH 7.5

PsiTransfer: Upload PATCH path traversal can create `config.<NODE_ENV>.js` and lead to code execution on restart

CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
0th

PsiTransfer is an open source, self-hosted file sharing solution. Prior to version 2.4.3, the upload PATCH flow under `/files/:uploadId` validates the mounted request path using the still-encoded `req.path`, but the downstream tus handler later writes using the decoded `req.params.uploadId`. In deployments that use a supported custom `PSITRANSFER_UPLOAD_DIR` whose basename prefixes a startup-loaded JavaScript path, such as `conf`, an unauthenticated attacker can create `config.<NODE_ENV>.js` in the application root. The attacker-controlled file is then executed on the next process restart. Version 2.4.3 contains a patch.

CWE CWE-22
Vendor psi-4ward
Product psitransfer
Published Apr 23, 2026
Stay Ahead of the Next One

Get instant alerts for psi-4ward psitransfer

Be the first to know when new high vulnerabilities affecting psi-4ward psitransfer are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

psi-4ward / psitransfer
< 2.4.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/psi-4ward/psitransfer/security/advisories/GHSA-533q-w4g6-5586 github.com: https://github.com/psi-4ward/psitransfer/commit/8b547bf3e09757122efa00aab90281e3915aa0c6 github.com: https://github.com/psi-4ward/psitransfer/releases/tag/v2.4.3