Impact
ThreatSonar Anti-Ransomware, developed by TeamT5, contains a Path Traversal flaw that allows authenticated remote attackers who can access the web interface to delete arbitrary files on the system. The vulnerability permits an attacker to specify a file path that traverses outside the intended directory, resulting in removal of critical system or application files. This loss of files can compromise system availability, disrupt services, and potentially expose sensitive information if deleted files were previously encrypted by the anti-ransomware software itself.
Affected Systems
The affected product is TeamT5’s ThreatSonar Anti-Ransomware. All deployments prior to the hotpatch released on 20260302 are vulnerable. No additional product variants or versions are listed, so any installation of this software that has not applied the hotpatch is at risk.
Risk and Exploitability
The CVSS score of 7.2 indicates a high severity. The EPSS score is not available, so the exact likelihood of exploitation is unknown. The vulnerability has been categorized as not listed in the CISA KEV catalog, although that does not preclude active exploitation. The likely attack path involves an attacker first authenticating to the web interface of ThreatSonar and then submitting a crafted request that includes a path traversal component to delete a target file. Compromise of the web credentials or a brute‑force attack on the authentication system could enable this scenario.
OpenCVE Enrichment