


Perceptive Security
SOC/SIEM Consultancy

PsiTransfer is an open source, self-hosted file sharing solution. Prior to version 2.4.3, the upload PATCH flow under `/files/:uploadId` validates the mounted r…
Published:
22 april 2026 om 22:00:00
Alert date:
23 april 2026 om 03:01:27
Source:
nvd.nist.gov
Web Technologies, Supply Chain & Dependencies
PsiTransfer, an open source file sharing solution, contains a critical vulnerability prior to version 2.4.3. The issue stems from inconsistent path validation in the upload PATCH flow, where the system validates encoded request paths but writes using decoded parameters. This allows unauthenticated attackers to exploit path traversal via URL encoding discrepancies. In specific deployment configurations with custom PSITRANSFER_UPLOAD_DIR settings, attackers can create malicious config files in the application root. These attacker-controlled JavaScript files are executed upon process restart, leading to remote code execution. The vulnerability affects the /files/:uploadId endpoint and has been patched in version 2.4.3.
Technical details
Mitigation steps:
Affected products:
PsiTransfer
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-41180
https://github.com/psi-4ward/psitransfer/commit/8b547bf3e09757122efa00aab90281e3915aa0c6
https://github.com/psi-4ward/psitransfer/releases/tag/v2.4.3
https://github.com/psi-4ward/psitransfer/security/advisories/GHSA-533q-w4g6-5586
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
