Crabbox Path Traversal (CVE-2026-45224) Enables Arbitrary File Deletion
The National Vulnerability Database has disclosed CVE-2026-45224, a high-severity path traversal vulnerability in Crabbox before version 0.9.0. This flaw resides within the Islo provider’s workspace path resolution, allowing attackers to manipulate paths to resolve outside the intended /workspace directory.
Attackers can craft malicious .crabbox.yaml or crabbox.yaml files containing traversal sequences. If the sync.delete option is enabled, the workspace preparation logic — which executes rm -rf and mkdir -p operations without proper path validation — will cause arbitrary file deletion and overwriting. This isn’t just a theoretical bug; it’s a direct path to system compromise through data destruction or manipulation.
With a CVSS score of 7.1 (HIGH), this vulnerability poses a significant risk. The attacker’s calculus is straightforward: leverage a seemingly innocuous configuration file to achieve impactful filesystem operations. Defenders need to understand that this isn’t about code execution directly, but about achieving destructive impact via misconfigured or vulnerable file operations.
What This Means For You
- If your organization uses Crabbox, you need to immediately check your version. Upgrade to Crabbox 0.9.0 or later to patch CVE-2026-45224. Furthermore, review your `sync.delete` configurations and ensure robust input validation for any user-supplied paths in CI/CD pipelines or automated deployment scripts that interact with Crabbox.
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-45224 | Path Traversal | Crabbox before 0.9.0 |
| CVE-2026-45224 | Path Traversal | Islo provider's workspace path resolution |
| CVE-2026-45224 | Arbitrary File Deletion | malicious .crabbox.yaml or crabbox.yaml file with traversal sequences when sync.delete is enabled |
| CVE-2026-45224 | Arbitrary File Overwrite | malicious .crabbox.yaml or crabbox.yaml file with traversal sequences when sync.delete is enabled |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 11, 2026 at 22:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.