LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-40611

CVE-2026-40611 - Vulnerability Analysis

HighCVSS: 8.8

Last Updated: April 21, 2026

Lego - Path Traversal

Published: April 21, 2026Updated: April 21, 2026Remote Exploitable

Overview

Lego < 4.34.0 contains a path traversal vulnerability in the webroot HTTP-01 challenge provider caused by improper validation of challenge tokens, letting a malicious ACME server write or delete arbitrary files, exploit requires interaction with a malicious ACME server.

Severity & Score

Severity: High
CVSS Score: 8.8
EPSS Score: 0.0%(Probability of exploitation in next 30 days)

Impact

A malicious ACME server can write or delete arbitrary files with the privileges of the Lego process, potentially leading to system compromise.

Mitigation

Upgrade to version 4.34.0 or later.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Apr 21, 2026

🟠 CVE-2026-40611 - High (8.8) Let's Encrypt client and ACME library written in Go (Lego). Prior to 4.34.0, the webroot HTTP-01 challenge provider in lego is vulnerable to arbitrary file write and deletion via path traversal. A malicious ACME server can supply a crafted challen... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-40611/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-40611
Severity
High
CVSS Score
8.8
Type
path_traversal
Status
new
EPSS
0.0%
Social Posts
1

CWE

  • CWE-22

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS Score

0.0%Probability of exploitation in the next 30 days