CrowdStrike LogScale Path Traversal Lets Attackers Read Any File
CVE-2026-40050 exposes CrowdStrike LogScale servers to unauthenticated file access via path traversal. CVSS 9.8—here's who's affected and how to patch.
A critical vulnerability in CrowdStrike's LogScale logging platform allows remote attackers to read arbitrary files from affected servers without authentication. The flaw, tracked as CVE-2026-40050, carries a CVSS score of 9.8 and affects multiple versions of the self-hosted product.
CrowdStrike disclosed the vulnerability on April 23, 2026, after discovering it through internal security testing. The company has released patches and confirmed no evidence of exploitation in the wild.
How the Vulnerability Works
The path traversal vulnerability exists in a specific cluster API endpoint within LogScale. An attacker who can reach a vulnerable LogScale instance over the network can craft HTTP requests that traverse the server's directory structure, accessing sensitive files without needing to authenticate.
This type of flaw can expose configuration files, encryption keys, log data, and other sensitive information stored on the server. For organizations using LogScale to aggregate security telemetry, a breach could reveal critical infrastructure details or customer data.
The attack requires network access to the LogScale instance but no credentials or user interaction, making it particularly dangerous for internet-exposed deployments.
Affected Versions
CrowdStrike has confirmed these versions are vulnerable:
- LogScale Self-Hosted GA: Versions 1.224.0 through 1.234.0 (inclusive)
- LogScale Self-Hosted LTS: Versions 1.228.0 and 1.228.1
LogScale SaaS customers are not directly affected. CrowdStrike deployed network-layer mitigations across all SaaS clusters on April 7, 2026, blocking exploitation attempts before the public disclosure. Organizations using self-hosted deployments should review our guide on what constitutes a data breach to understand reporting obligations if sensitive files were accessed.
Patched Versions
Organizations running self-hosted LogScale deployments should upgrade immediately to one of these fixed releases:
- Version 1.235.1 (latest GA)
- Version 1.234.1
- Version 1.233.1
- Version 1.228.2 (LTS branch)
The vendor strongly recommends prioritizing the upgrade given the critical severity rating and the unauthenticated nature of the attack. For organizations tracking vulnerability trends, our hacking news section covers similar critical disclosures daily.
Why This Matters
LogScale, formerly known as Humio, handles high-volume log aggregation and analysis for security operations centers worldwide. A vulnerability that exposes arbitrary file contents could undermine the security of the very infrastructure organizations rely on for threat detection.
This isn't the first time security tooling has become a target. Similar path traversal and authentication bypass vulnerabilities have affected other SIEM and log management platforms in recent months, including the LMDeploy SSRF flaw that was exploited within hours of disclosure. Attackers increasingly focus on security infrastructure because compromising these systems provides visibility into an organization's defenses and often yields privileged access.
CrowdStrike's internal discovery and rapid patching before any known exploitation is a positive outcome, but organizations running self-hosted deployments need to act quickly. The detailed nature of the disclosure—specifying affected versions and the vulnerable endpoint—gives attackers a roadmap if they can identify unpatched instances.
Recommended Actions
- Identify affected systems: Inventory all LogScale Self-Hosted deployments and check version numbers
- Upgrade immediately: Apply patches to reach version 1.235.1, 1.234.1, 1.233.1, or 1.228.2 (LTS)
- Review network exposure: Ensure LogScale instances are not directly accessible from the internet without additional authentication layers
- Check access logs: Review API endpoint access patterns for unusual path traversal attempts
- Monitor for IOCs: Watch for abnormal file access patterns or data exfiltration indicators
Organizations with questions about their exposure can consult CrowdStrike's security advisory or contact their CrowdStrike representative for additional guidance.
Related Articles
LangChain Flaws Expose Files, Secrets, and Databases
Three vulnerabilities in LangChain and LangGraph expose filesystems, environment secrets, and conversation histories. CVE-2026-34070 enables path traversal. Patches available now.
Mar 28, 2026Ubiquiti UniFi Flaw Scores CVSS 10—Patch Before Full Takeover
CVE-2026-22557 lets unauthenticated attackers traverse paths and hijack UniFi Network accounts. CVSS 10.0 severity demands immediate patching to 10.1.89.
Mar 27, 2026Centreon Open Tickets Hit by Critical CVSS 9.9 Path Traversal Flaw
CVE-2026-2749 enables unauthenticated attackers to write or delete arbitrary files on Centreon Central Servers. Patches now available for all supported versions.
Feb 28, 2026Xerox FreeFlow Core RCE Flaw Lets Attackers Hijack Print Servers
CVE-2026-2251 is a CVSS 9.8 path traversal vulnerability in Xerox FreeFlow Core that enables unauthenticated remote code execution. Upgrade to version 8.1.0 now.
Feb 27, 2026