Skip to main content
Version: v1.1.x

CVE-2026-40611

CVE Details

Visit the official vulnerability details page for CVE-2026-40611 to learn more.

Initial Publication

04/21/2026

Last Update

04/21/2026

Third Party Dependency

github.com/go-acme/lego/v4

NIST CVE Summary

Let's Encrypt client and ACME library written in Go (Lego). Prior to 4.34.0, the webroot HTTP-01 challenge provider in lego is vulnerable to arbitrary file write and deletion via path traversal. A malicious ACME server can supply a crafted challenge token containing ../ sequences, causing lego to write attacker-influenced content to any path writable by the lego process. This vulnerability is fixed in 4.34.0.

CVE Severity

8.8

Our Official Summary

Investigation is ongoing to determine how this vulnerability affects our products.

Status

Received

Affected Products & Versions

VersionPaletteAIPaletteAI VerteX
1.1.0⚠️ Impacted⚠️ Impacted

Revision History

No revisions available.