Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-9102
PUBLISHED
More InfoOfficial Page
Assigner-Altium
Assigner Org ID-4760f414-e1ae-4ff1-bdad-c7a9c3538b79
View Known Exploited Vulnerability (KEV) details
Published At-20 May, 2026 | 17:48
Updated At-20 May, 2026 | 19:30
Rejected At-
▼CVE Numbering Authority (CNA)
Path Traversal in Altium Enterprise Server ComparisonService Allows Arbitrary File Write

A path traversal vulnerability exists in the Altium Enterprise Server ComparisonService due to missing filename sanitization in the Gerber file upload APIs. A regular authenticated workspace user can supply a crafted filename in the multipart Content-Disposition header to escape the intended temporary upload directory and write arbitrary files to any location on the server filesystem. Because content-controlled files can be written to web-accessible directories, this can be escalated to remote code execution in the context of the service account. It can also be used to overwrite application binaries or configuration files, leading to service takeover or denial of service.

Affected Products
Vendor
Altium
Product
Altium Enterprise Server
Modules
  • ComparisonService (Gerber upload API)
Platforms
  • Web
Default Status
unaffected
Versions
Affected
  • From 0 before 8.0.4 (semver)
Problem Types
TypeCWE IDDescription
CWECWE-22CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWECWE-434CWE-434 Unrestricted upload of file with dangerous type
Type: CWE
CWE ID: CWE-22
Description: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Type: CWE
CWE ID: CWE-434
Description: CWE-434 Unrestricted upload of file with dangerous type
Metrics
VersionBase scoreBase severityVector
4.09.4CRITICAL
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Version: 4.0
Base score: 9.4
Base severity: CRITICAL
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-126CAPEC-126 Path Traversal
CAPEC-650CAPEC-650 Upload a Web Shell to a Web Server
CAPEC ID: CAPEC-126
Description: CAPEC-126 Path Traversal
CAPEC ID: CAPEC-650
Description: CAPEC-650 Upload a Web Shell to a Web Server
Solutions

Configurations

Workarounds

Exploits

Credits

finder
Joris Aerts, Tesla Inc.
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.altium.com/platform/security-compliance/security-advisories
N/A
Hyperlink: https://www.altium.com/platform/security-compliance/security-advisories
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found