Vulnerability Description
PsiTransfer is an open source, self-hosted file sharing solution. Prior to version 2.4.3, the upload PATCH flow under `/files/:uploadId` validates the mounted request path using the still-encoded `req.path`, but the downstream tus handler later writes using the decoded `req.params.uploadId`. In deployments that use a supported custom `PSITRANSFER_UPLOAD_DIR` whose basename prefixes a startup-loaded JavaScript path, such as `conf`, an unauthenticated attacker can create `config.<NODE_ENV>.js` in the application root. The attacker-controlled file is then executed on the next process restart. Version 2.4.3 contains a patch.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://github.com/psi-4ward/psitransfer/commit/8b547bf3e09757122efa00aab90281e3
- https://github.com/psi-4ward/psitransfer/releases/tag/v2.4.3
- https://github.com/psi-4ward/psitransfer/security/advisories/GHSA-533q-w4g6-5586
- https://github.com/psi-4ward/psitransfer/security/advisories/GHSA-533q-w4g6-5586
FAQ
What is CVE-2026-41180?
CVE-2026-41180 is a vulnerability with a CVSS score of 7.5 (HIGH). PsiTransfer is an open source, self-hosted file sharing solution. Prior to version 2.4.3, the upload PATCH flow under `/files/:uploadId` validates the mounted request path using the still-encoded `req...
How severe is CVE-2026-41180?
CVE-2026-41180 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-41180?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.