CrowdStrike disclosed a critical unauthenticated path-traversal vulnerability in its LogScale platform on 21 April 2026. CVE-2026-40050 carries a CVSS v3.1 score of 9.8 and was published on 21 April 2026, allowing remote attackers to read arbitrary files from the server filesystem without authentication.
The flaw sits in a specific cluster API endpoint within CrowdStrike LogScale that, if exposed, allows a remote attacker to read arbitrary files from the server filesystem without authentication. CrowdStrike identified this vulnerability during continuous and ongoing product testing, meaning no external researcher disclosure was involved.
Affected Versions and SaaS Protection
The vulnerability affects LogScale Self-Hosted GA versions 1.224.0 through 1.234.0 (inclusive), as well as LogScale Self-Hosted LTS versions 1.228.0 and 1.228.1. The vulnerability does not affect Next-Gen SIEM customers.
For LogScale SaaS customers, CrowdStrike deployed network-layer blocks across all clusters on 7 April 2026, roughly two weeks before the public disclosure. The company conducted a proactive review of all log data and found no evidence of exploitation in the wild.
Technical Mechanism
The vulnerability combines two distinct weaknesses. The CVE entry identifies CWE-306 Missing authentication for critical function and CWE-22 Improper Limitation of a Pathname to a Restricted Directory. Security analysts at CrowdStrike explain that the issue stems from two key weaknesses: missing authentication for a critical function and improper restriction of file paths within the system. The affected API endpoint does not properly verify whether a user is authorized before processing requests. At the same time, it fails to restrict how file paths are handled.
An attacker can manipulate file path parameters in requests to the vulnerable endpoint, bypassing both authentication checks and directory restrictions to access files outside the intended scope. This is precisely the type of flaw that makes security infrastructure particularly dangerous when compromised.
Patch Information
CrowdStrike has issued patched versions including 1.235.1 or later, 1.234.1 or later, 1.233.1 or later, and 1.228.2 LTS or later. According to the advisory, the patched versions do not introduce any performance degradation or functional limitations, and the company stated that internal testing identified the vulnerability before any known real-world exploitation attempts.
Apply patches immediately if you run self-hosted LogScale. LogScale Self-hosted customers should upgrade to a patched version immediately to remediate the vulnerability. The combination of unauthenticated access and path traversal makes this vulnerability trivially exploitable once an attacker can reach the cluster API endpoint.
If immediate patching is not feasible, ensure the endpoint is not publicly exposed; if it must be reachable, restrict its network access and monitor for unauthorized access attempts. These are temporary measures only. Patching remains the permanent solution.
References
- CrowdStrike Security Advisory CVE-2026-40050 – https://www.crowdstrike.com/en-us/security-advisories/cve-2026-40050/
- OpenCVE CVE-2026-40050 Details – https://app.opencve.io/cve/CVE-2026-40050
- Cybersecurity News: CrowdStrike LogScale Vulnerability – https://cybersecuritynews.com/crowdstrike-logscale-vulnerability/
- Security Affairs: Critical Bug in CrowdStrike LogScale – https://securityaffairs.com/191343/hacking/critical-bug-in-crowdstrike-logscale-let-attackers-access-files.html
- runZero: CrowdStrike Falcon LogScale Vulnerability – https://www.runzero.com/blog/crowdstrike-logscale/
- SecurityWeek: Vulnerabilities Patched in CrowdStrike Products – https://www.securityweek.com/vulnerabilities-patched-in-crowdstrike-tenable-products/
April 27, 2026