CVE-2026-33466Path Traversal in Logstash

CWE-22Path Traversal4 documents4 sources
Severity
8.1HIGHNVD
EPSS
0.4%
top 40.22%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 8

Description

Improper Limitation of a Pathname to a Restricted Directory (CWE-22) in Logstash can lead to arbitrary file write and potentially remote code execution via Relative Path Traversal (CAPEC-139). The archive extraction utilities used by Logstash do not properly validate file paths within compressed archives. An attacker who can serve a specially crafted archive to Logstash through a compromised or attacker-controlled update endpoint can write arbitrary files to the host filesystem with the privileg

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9

Affected Packages1 packages

CVEListV5elastic/logstash8.0.08.19.13

🔴Vulnerability Details

2
CVEList
Improper Limitation of a Pathname to a Restricted Directory in Logstash Leading to Arbitrary File Write2026-04-08
GHSA
GHSA-w3rv-2cr7-p2wh: Improper Limitation of a Pathname to a Restricted Directory (CWE-22) in Logstash can lead to arbitrary file write and potentially remote code executio2026-04-08

🕵️Threat Intelligence

1
Wiz
CVE-2026-33466 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-33466 — Path Traversal in Elastic Logstash | cvebase