CVE-2026-5966
Received Received - Intake
Path Traversal in ThreatSonar Anti-Ransomware Enables File Deletion

Publication date: 2026-04-20

Last updated on: 2026-04-20

Assigner: TWCERT/CC

Description
ThreatSonar Anti-Ransomware developed by TeamT5 has an Arbitrary File Deletion vulnerability. Authenticated remote attackers with web access can exploit Path Traversal to delete arbitrary files on the system.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-20
Last Modified
2026-04-20
Generated
2026-05-07
AI Q&A
2026-04-20
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
teamt5 threatsonar_anti-ransomware *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-23 The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as ".." that can resolve to a location that is outside of that directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in ThreatSonar Anti-Ransomware developed by TeamT5. It is an Arbitrary File Deletion vulnerability caused by a Path Traversal issue. Authenticated remote attackers who have web access can exploit this flaw to delete arbitrary files on the affected system.


How can this vulnerability impact me? :

Exploitation of this vulnerability allows an attacker with authenticated web access to delete arbitrary files on the system. This can lead to loss of critical data, disruption of system operations, and potential compromise of system integrity.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart