CVE-2026-9102
Received Received - Intake
Path Traversal in Altium Enterprise Server

Publication date: 2026-05-20

Last updated on: 2026-05-20

Assigner: Altium

Description
A path traversal vulnerability exists in the Altium Enterprise Server ComparisonService due to missing filename sanitization in the Gerber file upload APIs. A regular authenticated workspace user can supply a crafted filename in the multipart Content-Disposition header to escape the intended temporary upload directory and write arbitrary files to any location on the server filesystem. Because content-controlled files can be written to web-accessible directories, this can be escalated to remote code execution in the context of the service account. It can also be used to overwrite application binaries or configuration files, leading to service takeover or denial of service.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-20
Last Modified
2026-05-20
Generated
2026-05-21
AI Q&A
2026-05-20
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
altium enterprise_server *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
CWE-434 The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

The vulnerability allows an attacker to write files to web-accessible directories, which can lead to remote code execution with the privileges of the service account. Additionally, it can be used to overwrite application binaries or configuration files, potentially resulting in service takeover or denial of service.


Can you explain this vulnerability to me?

This vulnerability is a path traversal issue in the Altium Enterprise Server ComparisonService. It occurs because the Gerber file upload APIs do not properly sanitize filenames. An authenticated user can craft a filename in the multipart Content-Disposition header that escapes the intended temporary upload directory, allowing them to write arbitrary files anywhere on the server filesystem.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart