March 19 Advisory: Ubiquiti UniFi Network Application Remote Path Traversal Vulnerability [CVE-2026-22557]

Rapid Response

Vulnerability Description

CVE-2026-22557 is a critical unauthenticated path traversal vulnerability (CVSS 10.0) in the Ubiquiti UniFi Network Application. An attacker with network access can exploit this to access and manipulate files on the underlying system, leading to account compromise. No authentication or user interaction is required.

The UniFi Network Application is Ubiquiti’s centralized management platform for UniFi networking equipment. It is deployed both as a self-hosted controller on Linux/Windows and as a bundled application on UniFi OS hardware. Self-hosted controllers expose the Network Application directly and are clearly affected. UniFi OS devices also run the Network Application behind the OS portal.

Map of hosts exposed to CVE-2026-22557
Map of exposed hosts. See the full breakdown by country → 
FieldDescription
CVE-IDCVE-2026-22557 — CVSS 10 — assigned by HackerOne
Vulnerability DescriptionCVE-2026-22557 is a critical unauthenticated path traversal vulnerability (CVSS 10.0) in the Ubiquiti UniFi Network Application. An attacker with network access can exploit this to access and manipulate files on the underlying system, leading to account compromise. No authentication or user interaction is required.
Date of DisclosureMarch 18, 2026
Affected AssetsUbiquiti UniFi Network Application
Vulnerable Software VersionsOfficial Release: Version 10.1.85 and earlier (fixed in 10.1.89)
Release Candidate: Version 10.2.93 and earlier (fixed in 10.2.97)
UniFi Express (UX): Version 9.0.114 and earlier (fixed in firmware 4.0.13, which includes Network Application 9.0.118)
PoC AvailableNo public PoCs are available at time of writing
Exploitation StatusNo in-the-wild exploitation has been reported.
Patch StatusPatches are available. Ubiquiti released fixed versions on March 18, 2026. Users should update to version 10.1.89 or later (Official Release), 10.2.97 or later (Release Candidate), or UniFi Express firmware 4.0.13 or later.

This patch also addresses another vulnerability disclosed in the same advisory bulletin from Ubiquiti, CVE-2026-22558, which is an authenticated NoSQL injection that allows for privilege escalation within the application.

Censys ARC Perspective

At the time of writing, Censys observes 87,196 exposed hosts with the UniFi Network Application HTML title, trackable with the queries below. This includes both self-hosted controllers and UniFi OS devices that expose the Network Application directly. An additional population of UniFi OS devices shows only the OS portal (HTML title “UniFi OS”) and is not included in that count.

The UniFi Network Application does not expose its version externally. Build hashes in static asset paths vary per version and no public mapping is readily available, so Censys cannot distinguish between vulnerable and patched instances.

Platform

(host.services.endpoints.http.html_title: "UniFi Network" or web.endpoints.http.html_title: "UniFi Network") and not labels: "HONEYPOT"

ASM

host.services.http.response.html_title: "UniFi Network" or web_entity.instances.http.response.html_title: "UniFi Network"

Legacy Search

services.http.response.html_title: "UniFi Network" and not labels: {honeypot, tarpit}

References