CVE-2026-27884

Source
https://cve.org/CVERecord?id=CVE-2026-27884
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-27884.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-27884
Aliases
  • GHSA-fccr-6qm2-7h27
Published
2026-02-26T00:39:15.832Z
Modified
2026-03-03T02:56:47.237829Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N CVSS Calculator
Summary
NetExec vulnerable to arbitrary file write via path traversal in spider_plus module
Details

NetExec is a network execution tool. Prior to version 1.5.1, the module spiderplus improperly creates the output file and folder path when saving files from SMB shares. It does not take into account that it is possible for Linux SMB shares to have path traversal characters such as ../ in them. An attacker can craft a filename in an SMB share that includes these characters, which when spiderplus crawls and downloads, can write or overwrite arbitrary files. The issue is patched in v1.5.1. As a workaround, do not run spider_plus with DOWNLOAD=true against targets.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/27xxx/CVE-2026-27884.json",
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-22"
    ]
}
References

Affected packages

Git / github.com/pennyw0rth/netexec

Affected ranges

Type
GIT
Repo
https://github.com/pennyw0rth/netexec
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v1.*
v1.0.0
v1.1.0
v1.2.0
v1.3.0
v1.4.0
v1.5.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-27884.json"