CVE-2026-2328
Path Traversal in Backend Components Allows Remote Data Exposure
Publication date: 2026-03-30
Last updated on: 2026-03-30
Assigner: CERT VDE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wago | device_sphere | to 1.2.2 (exc) |
| wago | solution_builder | to 2.4.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-790 | The product receives data from an upstream component, but does not filter or incorrectly filters special elements before sending it to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-2328 is a vulnerability in WAGO Device Sphere and WAGO Solution Builder that allows an unauthenticated remote attacker to exploit insufficient input validation through a path traversal attack.
This means the attacker can access backend components beyond their intended scope by manipulating input paths, which bypasses normal security restrictions.
As a result, sensitive information may be exposed even though system integrity and availability are not affected.
How can this vulnerability impact me? :
This vulnerability can lead to unauthorized exposure of sensitive information stored in backend components of affected WAGO products.
Since the attacker does not need to be authenticated, the risk of data leakage is significant.
However, the vulnerability does not impact the integrity or availability of the system, meaning it does not allow modification or disruption of services.
What immediate steps should I take to mitigate this vulnerability?
To mitigate the CVE-2026-2328 vulnerability, update your affected software to the fixed versions.
- Update WAGO Device Sphere to version 1.2.2 or later.
- Update WAGO Solution Builder to version 2.4.2 or later.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability allows an unauthenticated remote attacker to access backend components beyond their intended scope via path traversal, resulting in exposure of sensitive information.
Exposure of sensitive information can lead to non-compliance with common standards and regulations such as GDPR and HIPAA, which require protection of personal and sensitive data.
Therefore, if exploited, this vulnerability could cause violations of data protection requirements mandated by these regulations.