CVE-2026-41180: PsiTransfer: Upload PATCH path traversal can create `config.<NODE_ENV>.js` and lead to code execution on restart
(updated )
The upload PATCH flow under /files/:uploadId validates the mounted request path using the still-encoded req.path, but the downstream tus handler later writes using the decoded req.params.uploadId. In deployments that use a supported custom PSITRANSFER_UPLOAD_DIR whose basename prefixes a startup-loaded JavaScript path, such as conf, an unauthenticated attacker can create config.<NODE_ENV>.js in the application root. The attacker-controlled file is then executed on the next process restart.
References
- github.com/advisories/GHSA-533q-w4g6-5586
- github.com/psi-4ward/psitransfer
- github.com/psi-4ward/psitransfer/commit/8b547bf3e09757122efa00aab90281e3915aa0c6
- github.com/psi-4ward/psitransfer/releases/tag/v2.4.3
- github.com/psi-4ward/psitransfer/security/advisories/GHSA-533q-w4g6-5586
- nvd.nist.gov/vuln/detail/CVE-2026-41180
Code Behaviors & Features
Detect and mitigate CVE-2026-41180 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →