ColdFusion Path Traversal Poses High Risk
The National Vulnerability Database (NVD) has flagged CVE-2026-34619, a critical path traversal vulnerability impacting Adobe ColdFusion versions 2023.18, 2025.6, and earlier. This flaw, categorized under CWE-22, allows an attacker to bypass security features and access unauthorized files or directories outside of intended restrictions.
According to the NVD, the exploit does not require user interaction, which significantly lowers the bar for adversaries. With a CVSS score of 7.7 (HIGH), this vulnerability presents a substantial risk, potentially leading to a security feature bypass and unauthorized data access, though the NVD indicates no direct impact on confidentiality or integrity, but a high impact on availability.
Path traversal vulnerabilities are a classic vector, but they remain effective because they often catch organizations off-guard, especially in legacy systems or misconfigured environments. The ability to navigate file systems beyond intended roots can be a precursor to more severe attacks, including data exfiltration or arbitrary code execution if chained with other weaknesses.
Related ATT&CK Techniques
🛡️ Detection Rules
5 rules · 5 SIEM formats5 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.
Web Application Exploitation Attempt — CVE-2026-34619
Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.
5 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get Detection Rules →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-34619 | Path Traversal | ColdFusion versions 2023.18 and earlier |
| CVE-2026-34619 | Path Traversal | ColdFusion versions 2025.6 and earlier |
| CVE-2026-34619 | Security feature bypass | Improper Limitation of a Pathname to a Restricted Directory |