Description
A zip slip vulnerability in the Admin import functionality of CTFd v3.8.1-18-gdb5a18c4 allows attackers to write arbitrary files outside the intended directories via supplying a crafted import.
Published: 2026-03-18
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary File Write
Action: Patch Upgrade
AI Analysis

Impact

A zip slip vulnerability in the Admin import functionality of CTFd v3.8.1-18-gdb5a18c4 allows attackers to write arbitrary files outside the intended directories by supplying a crafted import. Key detail from vendor description: "A zip slip vulnerability in the Admin import functionality of CTFd v3.8.1-18-gdb5a18c4 allows attackers to write arbitrary files outside the intended directories via supplying a crafted import." This flaw permits an attacker to place potentially malicious files in sensitive locations on the host system, which could be used in a broader attack chain. The primary impact is the capability to write arbitrary files; it does not itself grant immediate code execution, but it enables further exploitation steps if the placed files are executed by an application with higher privileges.

Affected Systems

The affected product is the open‑source CTFd platform. Versions v3.8.1-18-gdb5a18c4 and all releases before the patch issued in CTFd v3.8.2 are vulnerable. No specific vendor is listed, but the platform is maintained by the CTFd community and its code is available on GitHub.

Risk and Exploitability

The CVSS score of 7.5 indicates a high severity. The EPSS score of less than 1% suggests a low probability of exploitation in the wild at the time of disclosure. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is through the web interface’s Admin import feature, which requires legitimate administrative access. Based on the description, it is inferred that an attacker would need to compromise an administrator's credentials or otherwise gain access to the import endpoint to exploit the flaw. If such access is obtained, the ability to write arbitrary files could be leveraged for additional attacks such as privilege escalation or remote code execution when the files are later executed in a trusted context.

Generated by OpenCVE AI on March 19, 2026 at 16:15 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade CTFd to version 3.8.2 or later (see https://blog.ctfd.io/ctfd-3-8-2/)
  • If upgrade is not immediately possible, disable the Admin import functionality or restrict it to trusted administrators only
  • Ensure that the import endpoint performs strict validation of file paths to prevent path traversal

Generated by OpenCVE AI on March 19, 2026 at 16:15 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 28 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
References

Tue, 24 Mar 2026 13:30:00 +0000

Type Values Removed Values Added
Title CTFd Zip Slip Vulnerability in Admin Import Enables Arbitrary File Write

Thu, 19 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-23
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Mar 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Ctfd
Ctfd ctfd
Vendors & Products Ctfd
Ctfd ctfd

Wed, 18 Mar 2026 17:00:00 +0000

Type Values Removed Values Added
Description A zip slip vulnerability in the Admin import functionality of CTFd v3.8.1-18-gdb5a18c4 allows attackers to write arbitrary files outside the intended directories via supplying a crafted import.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-28T14:56:12.591Z

Reserved: 2026-03-04T00:00:00.000Z

Link: CVE-2026-30345

cve-icon Vulnrichment

Updated: 2026-03-19T14:07:13.764Z

cve-icon NVD

Status : Deferred

Published: 2026-03-18T17:16:06.703

Modified: 2026-04-28T15:16:28.177

Link: CVE-2026-30345

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-24T10:54:03Z

Weaknesses