CVE-2026-5966
Received
Received - Intake
Path Traversal in ThreatSonar Anti-Ransomware Enables File Deletion
Publication date: 2026-04-20
Last updated on: 2026-04-20
Assigner: TWCERT/CC
Description
Description
ThreatSonar Anti-Ransomware developed by TeamT5 has an Arbitrary File Deletion vulnerability. Authenticated remote attackers with web access can exploit Path Traversal to delete arbitrary files on the system.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| teamt5 | threatsonar_anti-ransomware | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-23 | The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as ".." that can resolve to a location that is outside of that directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in ThreatSonar Anti-Ransomware developed by TeamT5. It is an Arbitrary File Deletion vulnerability caused by a Path Traversal issue. Authenticated remote attackers who have web access can exploit this flaw to delete arbitrary files on the affected system.
How can this vulnerability impact me? :
Exploitation of this vulnerability allows an attacker with authenticated web access to delete arbitrary files on the system. This can lead to loss of critical data, disruption of system operations, and potential compromise of system integrity.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70