VYPR
Medium severity4.3NVD Advisory· Published Apr 27, 2026· Updated Apr 27, 2026

CVE-2026-30462

CVE-2026-30462

Description

A path traversal vulnerability in the Blocks module of Daylight Studio FuelCMS v1.5.2 allows attackers to execute a directory traversal.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A path traversal vulnerability in FuelCMS v1.5.2's Blocks module allows attackers to traverse directories via crafted input.

Vulnerability

Overview CVE-2026-30462 describes a path traversal vulnerability in the Blocks module of Daylight Studio FuelCMS v1.5.2 [1]. The vulnerable code resides in fuel/modules/fuel/controllers/Blocks.php [2], where insufficient input sanitization allows attackers to manipulate file paths.

Exploitation

Attackers can exploit this by sending specially crafted HTTP requests that include directory traversal sequences (e.g., '../') to the Blocks module. No authentication is required, making the attack surface easily accessible from the network.

Impact

Successful exploitation enables attackers to read arbitrary files on the server, potentially exposing sensitive configuration files, database credentials, or other confidential data. This could lead to further compromise of the CMS and underlying system.

Mitigation

As of the publication date, no official patch has been released. Users should consider applying input validation filters to sanitize path parameters or restrict access to the Blocks module until a fix is available.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.