A critical path traversal vulnerability, identified as CVE-2024-53961, has been discovered in Adobe ColdFusion versions 2023 and 2021. This flaw allows attackers to read arbitrary files from the server, potentially exposing sensitive data and configuration files. The vulnerability is a result of an improper limitation of pathnames to restricted directories. A proof-of-concept (PoC) exploit is already publicly available, significantly increasing the risk of exploitation, and making it easier for threat actors to weaponize the vulnerability. Adobe has released emergency security updates for ColdFusion to address this critical issue. Users of ColdFusion 2023 (update 11 and earlier) and ColdFusion 2021 (update 17 and earlier) are urged to immediately apply the latest patches. The company has classified this as a Priority 1 vulnerability, indicating a high risk of exploitation, and recommends that users install ColdFusion 2021 update 18 and ColdFusion 2023 update 12 within 72 hours. Organizations are also advised to implement the security configurations detailed in the ColdFusion lockdown guides to help mitigate this severe flaw.