Description
Let's Encrypt client and ACME library written in Go (Lego). Prior to 4.34.0, the webroot HTTP-01 challenge provider in lego is vulnerable to arbitrary file write and deletion via path traversal. A malicious ACME server can supply a crafted challenge token containing ../ sequences, causing lego to write attacker-influenced content to any path writable by the lego process. This vulnerability is fixed in 4.34.0.
Published: 2026-04-21
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-qqx8-2xmm-jrv8 ACME Lego: Arbitrary File Write via Path Traversal in Webroot HTTP-01 Provider
History

Sat, 25 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Wed, 22 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Go-acme
Go-acme lego
Vendors & Products Go-acme
Go-acme lego

Wed, 22 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description Let's Encrypt client and ACME library written in Go (Lego). Prior to 4.34.0, the webroot HTTP-01 challenge provider in lego is vulnerable to arbitrary file write and deletion via path traversal. A malicious ACME server can supply a crafted challenge token containing ../ sequences, causing lego to write attacker-influenced content to any path writable by the lego process. This vulnerability is fixed in 4.34.0.
Title Lego: Arbitrary File Write via Path Traversal in Webroot HTTP-01 Provider
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-21T19:17:54.210Z

Reserved: 2026-04-14T14:07:59.642Z

Link: CVE-2026-40611

cve-icon Vulnrichment

Updated: 2026-04-21T18:58:11.603Z

cve-icon NVD

Status : Deferred

Published: 2026-04-21T18:16:52.457

Modified: 2026-04-22T21:17:23.590

Link: CVE-2026-40611

cve-icon Redhat

Severity : Important

Publid Date: 2026-04-21T17:58:35Z

Links: CVE-2026-40611 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T11:45:55Z

Weaknesses