Critical Path Traversal in Gramps Web API Puts Data at Risk

Critical Path Traversal in Gramps Web API Puts Data at Risk

The National Vulnerability Database has disclosed CVE-2026-40258, a critical path traversal vulnerability (CVSS 9.1) affecting Gramps Web API versions 1.6.0 through 3.11.0. This ‘Zip Slip’ flaw in the media archive import feature allows an authenticated user with owner-level privileges to craft a malicious ZIP file. By embedding directory-traversal filenames, an attacker can write arbitrary files outside the intended temporary extraction directory on the server’s local filesystem.

This isn’t just a theoretical vulnerability; it’s a direct path to server compromise. An attacker could overwrite critical system files, inject web shells, or drop executables, leading to full system control. The National Vulnerability Database notes that the fix, implemented in version 3.11.1, validates ZIP entry names against the resolved real path, aborting imports where paths fall outside the temporary directory. This is a solid mitigation, but it means older, unpatched versions are sitting ducks.

For defenders, the implications are clear: a high-privilege user, even if legitimate but compromised, can completely subvert the server. This is a classic example of how seemingly innocuous features like file uploads or imports become critical attack vectors when input validation is insufficient. The attacker’s calculus here is simple: leverage a trusted, high-privilege account to gain arbitrary file write, then escalate to full system compromise. It’s a low-effort, high-reward scenario.

What This Means For You

  • If your organization uses Gramps Web API, immediately identify all instances running versions 1.6.0 through 3.11.0. Patch to version 3.11.1 or later without delay. Review your access controls for Gramps Web API to ensure only truly trusted personnel have owner-level privileges, as this vulnerability requires such access.

Related ATT&CK Techniques

🛡️ Detection Rules

3 rules · 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

critical T1021.002 Lateral Movement

CVE-2026-40258 - Gramps Web API Path Traversal via Malicious ZIP Import

Sigma YAML — free preview
✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Export via Bot →

Indicators of Compromise

IDTypeIndicator
CVE-2026-40258 Path Traversal Gramps Web API versions 1.6.0 through 3.11.0
CVE-2026-40258 Path Traversal Zip Slip vulnerability in media archive import feature
CVE-2026-40258 Path Traversal Authenticated user with owner-level privileges
CVE-2026-40258 Path Traversal Crafted malicious ZIP file with directory-traversal filenames
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedApril 18, 2026 at 01:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related Posts

ChurchCRM Flaw: Data Deletion Via CSRF

CVE-2026-40581 — ChurchCRM is an open-source church management system. In versions prior to 7.2.0, the family record deletion endpoint (SelectDelete.php) performs permanent, irreversible deletion of...

vulnerabilityCVEhigh-severitycwe-352cwe-862
/SCW Vulnerability Desk /HIGH /⚑ 3 IOCs /⚙ 3 Sigma

CVE-2026-40485 — ChurchCRM is an open-source church management system. In

CVE-2026-40485 — ChurchCRM is an open-source church management system. In versions prior to 7.2.0, the public API login endpoint (/api/public/user/login) returns distinguishable HTTP response codes...

vulnerabilityCVEmedium-severitycwe-204cwe-307
/SCW Vulnerability Desk /MEDIUM /⚑ 3 IOCs /⚙ 2 Sigma

ChurchCRM RCE: Unauthenticated Admin Exploit via Backup Restore

CVE-2026-40484 — ChurchCRM is an open-source church management system. In versions prior to 7.2.0, the database backup restore functionality extracts uploaded archive contents and copies...

vulnerabilityCVEcriticalhigh-severityremote-code-executioncwe-269cwe-434cwe-552
/SCW Vulnerability Desk /CRITICAL /⚑ 4 IOCs /⚙ 3 Sigma