Wiz Agents & Workflows are here

CVE-2026-1776
Ruby vulnerability analysis and mitigation

Camaleon CMS versions 2.4.5.0 through 2.9.0, prior to commit f54a77e, contain a path traversal vulnerability in the AWS S3 uploader implementation that allows authenticated users to read arbitrary files from the web server’s filesystem. The issue occurs in the download_private_file functionality when the application is configured to use the CamaleonCmsAwsUploader backend. Unlike the local uploader implementation, the AWS uploader does not validate file paths with valid_folder_path?, allowing directory traversal sequences to be supplied via the file parameter. As a result, any authenticated user, including low-privileged registered users, can access sensitive files such as /etc/passwd. This issue represents a bypass of the incomplete fix for CVE-2024-46987 and affects deployments using the AWS S3 storage backend.


SourceNVD

Related Ruby vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-34827HIGH7.5
  • RubyRuby
  • ruby-rack
NoYesApr 02, 2026
CVE-2026-34835MEDIUM4.8
  • RubyRuby
  • ruby-rack
NoYesApr 02, 2026
CVE-2026-32762MEDIUM4.8
  • RubyRuby
  • ruby-rack
NoYesApr 02, 2026
CVE-2026-26962MEDIUM4.8
  • RubyRuby
  • rack
NoYesApr 02, 2026
CVE-2026-34831MEDIUM4.8
  • RubyRuby
  • rack
NoYesApr 02, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management