Five Steps for Frontier AI Security Readiness Download
Security Advisories

CVE-2026-40050 — CrowdStrike LogScale Unauthenticated Path Traversal

Summary

CrowdStrike has released security updates to address a critical unauthenticated path traversal vulnerability in LogScale. This vulnerability only requires mitigation by customers that host specific versions of LogScale and does not affect Next-Gen SIEM customers. The vulnerability exists in a specific cluster API endpoint that, if exposed, allows a remote attacker to read arbitrary files from the server filesystem without authentication.

Next-Gen SIEM customers are not affected and do not need to take any action. CrowdStrike mitigated the vulnerability for LogScale SaaS customers by deploying network-layer blocks to all clusters on April 7, 2026. We have proactively reviewed all log data and there is no evidence of exploitation.

LogScale Self-hosted customers should upgrade to a patched version immediately to remediate the vulnerability.

CrowdStrike identified this vulnerability during continuous and ongoing product testing.

Exploitation status

CrowdStrike has no indication of any exploitation of this in the wild.

CrowdStrike is actively monitoring for signs of abuse or usage of this flaw for LogScale SaaS customers. Customers with self-hosted instances should immediately upgrade to a fixed version and follow normal procedures to monitor for signs of abuse.

Severity

CrowdStrike has scored this issue as 9.8 (CRITICAL) using the Common Vulnerability Scoring System Calculator v3.1 from NIST NVD.

Weakness Type and Impact

  • CWE-306: Missing Authentication for Critical Function
  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Performance impact

No direct or indirect impact to LogScale is expected.

Affected Versions

  • LogScale Self-Hosted: GA versions 1.224.0 through 1.234.0 (inclusive).
  • LogScale Self-Hosted LTS: Version 1.228.0, 1.228.1.

Remediation

CrowdStrike has developed patched builds to resolve this vulnerability. Self-hosted customers should upgrade to one of the following fixed versions immediately:

  • 1.235.1 or later
  • 1.234.1 or later
  • 1.233.1 or later
  • 1.228.2 (LTS) or later

Resources

Additional Questions

If you have additional questions, please reach out to your Technical Account Manager, Sales Engineer, Account Manager, or CrowdStrike Support.