CVE-2026-6855 PUBLISHED

Instructlab: instructlab: path traversal allows arbitrary directory creation and file write

Assigner: redhat
Reserved: 22.04.2026 Published: 22.04.2026 Updated: 22.04.2026

A flaw was found in InstructLab. A local attacker could exploit a path traversal vulnerability in the chat session handler by manipulating the logs_dir parameter. This allows the attacker to create new directories and write files to arbitrary locations on the system, potentially leading to unauthorized data modification or disclosure.

Metrics

CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
CVSS Score: 7.1

Product Status

Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI) 3
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI) 3
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI) 3
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI) 3
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI) 3
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux AI (RHEL AI) 3
Versions Default: affected

Workarounds

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

Credits

  • Red Hat would like to thank Martin Brodeur (independent security researcher) for reporting this issue.

References

Problem Types

  • Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE