CrowdStrike has disclosed and patched CVE-2026-40050, a critical unauthenticated path traversal vulnerability in its self-hosted LogScale log management platform (formerly known as Humio). The flaw, which was discovered internally by CrowdStrike's security team, could allow a remote attacker with network access to a vulnerable API endpoint to read arbitrary files from the server's filesystem. This could result in the exposure of highly sensitive data, such as credentials, private keys, or configuration files stored on the LogScale server. CrowdStrike has confirmed that its cloud-hosted SaaS customers are not affected. All customers running self-hosted instances are strongly advised to apply the provided patches immediately.
The vulnerability is a classic path traversal flaw (CWE-22: Improper Limitation of a Pathname to a Restricted Directory). It exists in a specific, undisclosed cluster API endpoint within the LogScale software.
An unauthenticated attacker could send a specially crafted request to this API endpoint containing path traversal sequences (e.g., ..%2f or ..\). If the application does not properly sanitize this input, it can be tricked into accessing files outside of the intended directory. For example, an attacker could potentially read files like /etc/passwd, application configuration files containing database credentials, or SSH private keys.
This combination of factors makes the vulnerability highly critical, as it can be easily exploited by a remote attacker without any prior access or authentication.
The vulnerability was discovered internally by CrowdStrike, and the company states it has found no evidence of exploitation against its own SaaS environment. However, now that the vulnerability is public, threat actors will likely begin scanning for and attempting to exploit unpatched self-hosted instances.
The impact of a successful exploit is severe information disclosure. An attacker could gain access to sensitive data that would enable further attacks. For example:
Given that LogScale is a centralized logging platform, the server itself is a high-value target, and its compromise could have cascading effects across an organization's security infrastructure.
The following patterns may help identify vulnerable systems or exploitation attempts:
..%2f, ../, ..\LogScale access logs[LogScale install dir]/.../etc/, C:\Windows\).URL Analysis (D3-UA).The primary mitigation is to upgrade self-hosted LogScale instances to a patched version.
Restrict network access to the LogScale cluster API endpoints to only trusted management subnets.
Use a Web Application Firewall (WAF) to inspect incoming requests for path traversal patterns and block them.
CrowdStrike mitigates the vulnerability for its SaaS customers by deploying network-layer blocks.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats