Path Traversal

1798 CVEs technique

Monthly

CVE-2025-14914 HIGH This Week

IBM WebSphere Application Server Liberty 17.0.0.3 through 26.0.0.1 could allow a privileged user to upload a zip archive containing path traversal sequences resulting in an overwrite of files leading to arbitrary code execution. [CVSS 7.6 HIGH]

IBM Path Traversal Websphere Application Server RCE
NVD
CVSS 3.1
7.6
EPSS
0.0%
CVE-2026-1703 PATCH Monitor

When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.

Path Traversal
NVD GitHub
EPSS
0.0%
CVE-2026-1186 Monitor

EAP Legislator is vulnerable to Path Traversal in file extraction functionality. Attacker can prepare zipx archive (default file type used by the Legislator application) and choose arbitrary path outside the intended directory (e.x.

Path Traversal
NVD
EPSS
0.1%
CVE-2022-50950 MEDIUM This Month

Webile 1.0.1 contains a directory traversal vulnerability that allows remote attackers to manipulate file system paths without authentication. Attackers can exploit path manipulation to access sensitive system directories and potentially compromise the mobile device's local file system. [CVSS 6.5 MEDIUM]

Path Traversal
NVD
CVSS 3.1
6.5
EPSS
0.4%
CVE-2021-47921 MEDIUM This Month

Free Photo & Video Vault 0.0.2 contains a directory traversal web vulnerability that allows remote attackers to manipulate application path requests and access sensitive system files. [CVSS 6.5 MEDIUM]

Path Traversal
NVD
CVSS 3.1
6.5
EPSS
0.4%
CVE-2026-25069 POC This Week

SunFounder Pironman Dashboard (pm_dashboard) version 1.3.13 and prior contain a path traversal vulnerability in the log file API endpoints. An unauthenticated remote attacker can supply traversal sequences via the filename parameter to read and delete arbitrary files.

Denial Of Service Path Traversal
NVD GitHub
EPSS
0.2%
CVE-2020-37041 HIGH POC This Week

OpenCTI 3.3.1 is vulnerable to a directory traversal attack via the static/css endpoint. An unauthenticated attacker can read arbitrary files from the filesystem by sending crafted GET requests with path traversal sequences (e.g., '../') in the URL. [CVSS 7.5 HIGH]

Linux Windows Path Traversal Opencti
NVD GitHub Exploit-DB
CVSS 3.1
7.5
EPSS
0.4%
CVE-2020-37034 HIGH POC This Week

HelloWeb 2.0 contains an arbitrary file download vulnerability that allows remote attackers to download system files by manipulating filepath and filename parameters. Attackers can send crafted GET requests to download.asp with directory traversal to access sensitive configuration and system files. [CVSS 7.5 HIGH]

Path Traversal
NVD Exploit-DB
CVSS 3.1
7.5
EPSS
0.2%
CVE-2026-25152 MEDIUM PATCH This Month

Backstage TechDocs plugin versions prior to 1.13.11 and 1.14.1 contain a path traversal vulnerability that allows authenticated attackers to read arbitrary files from the host filesystem when the local generator is enabled. The vulnerability stems from insufficient symlink validation during the documentation build process, enabling attackers to embed sensitive file contents into generated HTML accessible to documentation viewers. Organizations using `techdocs.generator.runIn: local` with untrusted documentation sources are at risk until patching to the fixed versions.

Node.js Docker Path Traversal Backstage Redhat
NVD GitHub
CVSS 3.1
5.3
EPSS
0.0%
CVE-2026-22625 MEDIUM This Month

HIKSEMI NAS devices improperly validate filenames, allowing attackers with physical access to traverse directory structures and read sensitive system files. This vulnerability affects confidentiality but requires local presence and no authentication, making it a risk primarily in physically accessible environments. No patch is currently available for this issue.

Path Traversal
NVD
CVSS 3.1
4.6
EPSS
0.0%
CVE-2026-0963 CRITICAL Act Now

Path traversal in Crafty Controller game server management allows authenticated attackers to read/write files outside the intended directory. CVSS 9.9 with scope change.

RCE Path Traversal Crafty Controller
NVD
CVSS 3.1
9.9
EPSS
0.1%
CVE-2026-0805 HIGH This Week

Remote code execution in Crafty Controller's Backup Configuration feature results from insufficient path traversal validation, enabling authenticated attackers to manipulate files and execute arbitrary code on affected systems. The vulnerability requires valid credentials and specific conditions to exploit but carries high impact due to its ability to compromise system integrity and confidentiality. No patch is currently available.

RCE Path Traversal Crafty Controller
NVD
CVSS 3.1
8.2
EPSS
0.0%
CVE-2026-25116 HIGH POC This Week

Runtipi versions 4.5.0 through 4.7.1 contain an unauthenticated path traversal vulnerability in the UserConfigController that allows remote attackers to overwrite the docker-compose.yml configuration file through insecure URN parsing. An attacker can inject a malicious stack configuration that executes arbitrary code when the instance restarts, achieving full remote code execution and host compromise. Public exploit code exists and no patch is currently available.

Docker RCE Path Traversal Runtipi
NVD GitHub
CVSS 3.1
7.6
EPSS
0.1%
CVE-2026-24846 MEDIUM PATCH This Month

malcontent discovers supply-chain compromises through. context, differential analysis, and YARA. [CVSS 5.5 MEDIUM]

Path Traversal Malcontent Suse
NVD GitHub
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-24687 MEDIUM PATCH This Month

Authenticated users in Umbraco Forms versions 16 and 17 can exploit a path traversal vulnerability to read arbitrary files on Mac and Linux systems running the CMS. An attacker with backoffice access can enumerate and access sensitive files through the export endpoint by manipulating the fileName parameter. No patch is currently available, though the vulnerability is mitigated by restricting backoffice access and blocking path traversal sequences at the WAF level.

Linux Path Traversal Umbraco Forms
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-15543 MEDIUM This Month

Improper link resolution in USB HTTP access path in VX800v v1.0 allows a crafted USB device to expose root filesystem contents, giving an attacker with physical access read‑only access to system files. [CVSS 4.6 MEDIUM]

Path Traversal Vx800v Firmware
NVD
CVSS 3.1
4.6
EPSS
0.0%
CVE-2025-15541 MEDIUM This Month

Improper link resolution in the VX800v v1.0 SFTP service allows authenticated adjacent attackers to use crafted symbolic links to access system files, resulting in high confidentiality impact and limited integrity risk. [CVSS 6.3 MEDIUM]

Path Traversal Vx800v Firmware
NVD
CVSS 3.1
6.3
EPSS
0.0%
CVE-2020-37015 HIGH POC This Week

Ruijie Networks Switch eWeb S29_RGOS 11.4 contains a directory traversal vulnerability that allows unauthenticated attackers to access sensitive configuration files by manipulating file path parameters. [CVSS 7.5 HIGH]

Path Traversal
NVD Exploit-DB
CVSS 3.1
7.5
EPSS
0.4%
CVE-2026-1616 HIGH PATCH This Week

Open Security Issue Management (OSIM) prior to v2025.9.0 contains a path traversal vulnerability in its nginx configuration that improperly concatenates URI and query string parameters, allowing unauthenticated remote attackers to access unauthorized files and directories. The vulnerability affects both OSIM and Nginx deployments using vulnerable configurations, enabling information disclosure through crafted query parameters. A patch is available for affected versions.

Nginx Path Traversal Open Security Issue Management
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-1588 LOW POC Monitor

A vulnerability was found in jishenghua jshERP up to 3.6. The impacted element is the function install of the file /jshERP-boot/plugin/installByPath of the component com.gitee.starblues.integration.operator.DefaultPluginOperator. [CVSS 2.7 LOW]

Path Traversal
NVD GitHub VulDB
CVSS 3.1
2.7
EPSS
0.1%
CVE-2026-1549 MEDIUM POC This Month

jshERP versions up to 3.6 contain a path traversal vulnerability in the PluginController's file upload functionality that allows authenticated attackers to read arbitrary files on the server. Public exploit code exists for this vulnerability, and the vendor has not yet released a patch despite being notified of the issue.

Path Traversal Jsherp
NVD GitHub VulDB
CVSS 3.1
4.3
EPSS
0.0%
CVE-2026-1532 LOW POC Monitor

A vulnerability was identified in D-Link DCS-700L 1.03.09. The affected element is the function uploadmusic of the file /setUploadMusic of the component Music File Upload Service. [CVSS 2.4 LOW]

D-Link Path Traversal
NVD VulDB
CVSS 3.1
2.4
EPSS
0.1%
CVE-2025-69601 MEDIUM POC This Month

A directory traversal (Zip Slip) vulnerability exists in the “Static Sites” feature of 66biolinks v44.0.0 by AltumCode. Uploaded ZIP archives are automatically extracted without validating or sanitizing file paths. [CVSS 6.5 MEDIUM]

Path Traversal 66biolinks
NVD GitHub
CVSS 3.1
6.5
EPSS
0.1%
CVE-2020-36973 MEDIUM POC This Month

PDW File Browser 1.3 contains a remote code execution vulnerability that allows authenticated users to upload and rename webshell files to arbitrary web server locations. [CVSS 6.5 MEDIUM]

PHP RCE Path Traversal
NVD GitHub Exploit-DB
CVSS 3.1
6.5
EPSS
0.1%
CVE-2026-24842 HIGH POC PATCH This Week

node-tar before version 7.5.7 contains a path traversal vulnerability where inconsistent path resolution between validation and execution logic allows attackers to bypass security checks and create hardlinks to arbitrary files outside the intended extraction directory. Public exploit code exists for this vulnerability, affecting Node.js applications that process untrusted TAR archives. An attacker can craft a malicious TAR file to write to sensitive locations on the system.

D-Link Node.js Industrial Path Traversal Tar +2
NVD GitHub VulDB
CVSS 3.1
8.2
EPSS
0.0%
CVE-2026-24909 MEDIUM PATCH This Month

Path traversal in vlt versions before 1.0.0-rc.10 allows local attackers to write files outside their intended directories during tar archive extraction due to insufficient path sanitization. An attacker with local access could exploit this to overwrite arbitrary files on the system with elevated scope impact. No patch is currently available for this vulnerability.

Path Traversal
NVD GitHub
CVSS 3.1
5.9
EPSS
0.0%
CVE-2026-24741 HIGH POC PATCH This Week

Arbitrary file deletion in ConvertX prior to version 0.17.0 allows authenticated attackers to remove files outside the intended upload directory by exploiting insufficient path validation in the POST /delete endpoint. The vulnerability enables attackers to supply path traversal sequences that bypass directory restrictions, with impact limited only by server process permissions. Public exploit code exists for this HIGH severity flaw, though a patch is available in version 0.17.0.

Path Traversal Convertx
NVD GitHub
CVSS 3.1
8.1
EPSS
0.1%
CVE-2026-23593 HIGH This Week

web-based management interface of HPE Aruba Networking Fabric Composer is affected by path traversal (CVSS 7.5).

Path Traversal
NVD
CVSS 3.1
7.5
EPSS
0.0%
CVE-2020-36939 HIGH POC This Week

Cassandra Web 0.5.0 contains a directory traversal vulnerability that allows unauthenticated attackers to read arbitrary files by manipulating path traversal parameters. [CVSS 7.5 HIGH]

Apache Path Traversal
NVD GitHub Exploit-DB
CVSS 3.1
7.5
EPSS
0.7%
CVE-2026-24801 Monitor

Vulnerability in Ralim IronOS (source/Core/BSP/Pinecilv2/bl_mcu_sdk/components/ble/ble_stack/common/tinycrypt/source modules). This vulnerability is associated with program files ecc_dsa.C.

Path Traversal
NVD GitHub
EPSS
0.0%
CVE-2026-24486 HIGH POC PATCH This Week

Arbitrary file write in Python-Multipart versions before 0.0.22 allows remote attackers to store uploaded files to any filesystem location when non-default configuration options UPLOAD_DIR and UPLOAD_KEEP_FILENAME=True are enabled. An attacker can exploit this path traversal vulnerability by crafting malicious filenames in multipart uploads, potentially overwriting critical system or application files. Public exploit code exists for this vulnerability; affected users should upgrade to version 0.0.22 or disable UPLOAD_KEEP_FILENAME=True as an interim mitigation.

Python Path Traversal Python Multipart Redhat Suse
NVD GitHub
CVSS 3.1
8.6
EPSS
0.0%
CVE-2026-24479 CRITICAL PATCH Act Now

HUSTOJ online judge has a path traversal vulnerability enabling arbitrary file access on the competition server.

Linux PHP MySQL RCE Path Traversal +1
NVD GitHub
CVSS 3.1
9.8
EPSS
0.6%
CVE-2026-24478 HIGH POC This Week

AnythingLLM versions prior to 1.10.0 contain a path traversal vulnerability in the DrupalWiki integration that allows malicious administrators or attackers with admin privileges to write arbitrary files to the server, potentially achieving remote code execution through configuration file overwriting or malicious script injection. Public exploit code exists for this vulnerability, and no patch is currently available for affected deployments. The attack requires high-level privileges but carries critical risk due to the ability to completely compromise server integrity.

Drupal RCE Path Traversal AI / ML Anythingllm
NVD GitHub
CVSS 3.1
7.2
EPSS
0.2%
CVE-2026-24123 HIGH PATCH This Week

BentoML versions prior to 1.4.34 allow path traversal attacks through improperly validated file path fields in bentofile.yaml configurations, enabling attackers to embed arbitrary files from the victim's system into bento archives during the build process. This vulnerability can be exploited to exfiltrate sensitive data such as credentials, SSH keys, and environment variables into supply chain artifacts that may be pushed to registries or deployed in production environments. A patch is available in version 1.4.34.

Python Docker Path Traversal AI / ML Bentoml
NVD GitHub
CVSS 3.1
7.4
EPSS
0.0%
CVE-2026-23890 MEDIUM POC PATCH This Month

Pnpm versions up to 10.28.1 contains a vulnerability that allows attackers to overwriting config files, scripts, or other sensitive files (CVSS 6.5).

Node.js Path Traversal Pnpm Redhat Suse
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-23889 MEDIUM POC PATCH This Month

Path traversal in pnpm's tarball extraction on Windows allows attackers to write files outside the intended package directory by exploiting incomplete path normalization that fails to block backslash-based traversal sequences. Public exploit code exists for this vulnerability, which affects Windows developers and CI/CD pipelines (GitHub Actions, Azure DevOps) and could result in overwriting sensitive configuration files like .npmrc or build configurations. A patch is available in pnpm version 10.28.1 and later.

Windows Node.js Azure Github Path Traversal +2
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-23888 MEDIUM POC PATCH This Month

Path traversal in pnpm's binary fetcher (versions prior to 10.28.1) allows attackers to write files outside the intended extraction directory through malicious ZIP entries or crafted prefix values, potentially overwriting critical configuration files and scripts on affected systems. All pnpm users installing packages with binary assets are vulnerable, particularly those in CI/CD pipelines or with custom Node.js binary configurations. Public exploit code exists for this medium-severity vulnerability.

Node.js Path Traversal Pnpm Redhat Suse
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-59099 Monitor

The Access Manager is using the open source web server CompactWebServer written in C#. This web server is affected by a path traversal vulnerability, which allows an attacker to directly access files via simple GET requests without prior authentication.

SQLi Denial Of Service Path Traversal
NVD
EPSS
0.2%
CVE-2026-24469 HIGH This Week

C++ HTTP Server versions 1.0 and below suffer from a path traversal vulnerability in the RequestHandler::handleRequest method that permits unauthenticated remote attackers to read arbitrary files from the server filesystem through malicious HTTP GET requests containing directory traversal sequences. The vulnerability stems from insufficient input validation on the URL path, which is directly concatenated to the base directory without sanitization. No patch is currently available.

Path Traversal
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2021-47903 HIGH POC This Week

LiteSpeed Web Server Enterprise 5.4.11 contains an authenticated command injection vulnerability in the external app configuration interface. [CVSS 8.8 HIGH]

RCE Path Traversal Command Injection
NVD Exploit-DB
CVSS 3.1
8.8
EPSS
0.3%
CVE-2025-11002 HIGH PATCH This Week

7-Zip ZIP File Parsing Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of 7-Zip. [CVSS 7.8 HIGH]

RCE Path Traversal 7 Zip Suse
NVD
CVSS 3.1
7.8
EPSS
0.1%
CVE-2026-20613 HIGH POC This Week

Path traversal in the ArchiveReader.extractContents() function used by container image load operations allows local attackers to write arbitrary files to any user-writable location on the system by crafting malicious archives with relative pathnames. Public exploit code exists for this vulnerability, and affected users cannot currently patch as fixes are only available in container 0.8.0 and containerization 0.21.0. The vulnerability requires local access and user interaction but carries high severity due to potential for file overwrite and system compromise.

Path Traversal Containerization Container
NVD GitHub
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-21227 HIGH This Week

Privilege escalation in Azure Logic Apps results from improper path validation, enabling remote attackers to gain elevated access without authentication or user interaction. Organizations using Azure Logic Apps are at risk of unauthorized privilege elevation through network-based attacks, with no available patch currently provided.

Azure Path Traversal Azure Logic Apps
NVD
CVSS 3.1
8.2
EPSS
0.1%
CVE-2026-23954 HIGH POC PATCH This Week

Incus is a system container and virtual machine manager. [CVSS 8.7 HIGH]

Path Traversal Incus Suse
NVD GitHub
CVSS 3.1
8.7
EPSS
0.0%
CVE-2025-69097 HIGH This Week

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in VibeThemes WPLMS wplms_plugin allows Path Traversal.This issue affects WPLMS: from n/a through <= 1.9.9.5.4. [CVSS 8.1 HIGH]

Path Traversal
NVD
CVSS 3.1
8.1
EPSS
0.1%
CVE-2025-69055 MEDIUM This Month

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in SeaTheme BM Content Builder allows Path Traversal.This issue affects BM Content Builder: from n/a before 3.16.3.3. [CVSS 6.5 MEDIUM]

Path Traversal
NVD
CVSS 3.1
6.5
EPSS
0.1%
CVE-2025-68912 HIGH This Week

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Harmonic Design HDForms hdforms allows Path Traversal.This issue affects HDForms: from n/a through <= 1.6.1. [CVSS 8.6 HIGH]

Path Traversal
NVD
CVSS 3.1
8.6
EPSS
0.1%
CVE-2025-68907 HIGH This Week

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in AivahThemes Hostme v2 hostmev2 allows Path Traversal.This issue affects Hostme v2: from n/a through <= 7.0. [CVSS 7.5 HIGH]

Path Traversal
NVD
CVSS 3.1
7.5
EPSS
0.1%
CVE-2025-68902 HIGH This Week

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in AivahThemes Anona anona allows Path Traversal.This issue affects Anona: from n/a through <= 8.0. [CVSS 7.3 HIGH]

Path Traversal
NVD
CVSS 3.1
7.3
EPSS
0.0%
CVE-2025-68901 HIGH This Week

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in AivahThemes Anona anona allows Path Traversal.This issue affects Anona: from n/a through <= 8.0. [CVSS 8.6 HIGH]

Path Traversal
NVD
CVSS 3.1
8.6
EPSS
0.0%
CVE-2025-67963 HIGH This Week

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in ovatheme Movie Booking movie-booking allows Path Traversal.This issue affects Movie Booking: from n/a through <= 1.1.5. [CVSS 8.6 HIGH]

Path Traversal
NVD
CVSS 3.1
8.6
EPSS
0.1%
CVE-2023-7335 POC This Week

EduSoho versions prior to 22.4.7 contain an arbitrary file read vulnerability in the classroom-course-statistics export functionality.

Industrial Path Traversal
NVD GitHub
EPSS
0.1%
CVE-2025-69820 MEDIUM POC PATCH This Month

Directory Traversal vulnerability in Beam beta9 v.0.1.521 allows a remote attacker to obtain sensitive information via the joinCleanPath function. [CVSS 6.0 MEDIUM]

Path Traversal Beta9 Suse
NVD GitHub
CVSS 3.1
6.0
EPSS
0.2%
CVE-2025-69612 MEDIUM POC This Month

A path traversal vulnerability exists in TMS Management Console (version 6.3.7.27386.20250818) from TMS Global Software. [CVSS 6.5 MEDIUM]

Path Traversal Tms Management Console
NVD GitHub
CVSS 3.1
6.5
EPSS
0.3%
CVE-2025-67684 HIGH This Week

Quick.Cart is vulnerable to Local File Inclusion and Path Traversal issues in the theme selection mechanism. Quick.Cart allows a privileged user to upload arbitrary file contents while only validating the filename extension. [CVSS 7.2 HIGH]

PHP RCE Lfi Path Traversal Quick.Cart
NVD
CVSS 3.1
7.2
EPSS
0.6%
CVE-2026-1330 HIGH This Week

MeetingHub Paperless Meetings contains an arbitrary file read vulnerability that enables unauthenticated remote attackers to download sensitive system files through path traversal exploitation. The vulnerability affects all installations without authentication requirements, allowing attackers to access confidential data with high confidentiality impact. No patch is currently available for this issue.

Path Traversal Meetinghub Paperless Meetings
NVD
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-24047 MEDIUM PATCH This Month

The resolveSafeChildPath function in Backstage's backend-plugin-api prior to version 0.1.17 improperly validates symlink chains and dangling symlinks, allowing authenticated attackers to bypass path traversal protections used by Scaffolder actions and other backend components. An attacker with low privileges could exploit this to access files outside the intended directory boundaries by chaining intermediate symlinks or creating symlinks pointing to non-existent paths that are later materialized during file operations. This affects Backstage installations relying on the vulnerable path validation function for security isolation.

Path Traversal Redhat
NVD GitHub
CVSS 3.1
6.3
EPSS
0.0%
CVE-2026-24046 HIGH PATCH This Week

Backstage Scaffolder actions and archive extraction utilities are vulnerable to symlink-based path traversal attacks, allowing authenticated users with template creation privileges to read sensitive files, delete arbitrary files outside the workspace, or write malicious files via crafted symlinks in tar/zip archives. This affects deployments where users can create or execute Scaffolder templates, with no patch currently available for versions prior to @backstage/backend-defaults 0.12.2.

Path Traversal Redhat
NVD GitHub
CVSS 3.1
7.1
EPSS
0.0%
CVE-2021-47850 HIGH POC This Week

Mini Mouse 9.2.0 contains a path traversal vulnerability that allows remote attackers to access arbitrary system files and directories through crafted HTTP requests. [CVSS 7.5 HIGH]

Path Traversal Mini Mouse
NVD Exploit-DB
CVSS 3.1
7.5
EPSS
1.2%
CVE-2021-47849 MEDIUM POC This Month

Mini Mouse 9.3.0 contains a path traversal vulnerability that allows attackers to access sensitive system directories through the device information endpoint. Attackers can retrieve file lists from system directories like /usr, /etc, and /var by manipulating file path parameters in API requests. [CVSS 6.2 MEDIUM]

Path Traversal Mini Mouse
NVD Exploit-DB
CVSS 3.1
6.2
EPSS
0.2%
CVE-2021-47746 HIGH POC This Week

NodeBB Plugin Emoji 3.2.1 contains an arbitrary file write vulnerability that allows administrative users to write files to arbitrary system locations through the emoji upload API. [CVSS 7.5 HIGH]

Path Traversal
NVD GitHub Exploit-DB
CVSS 3.1
7.5
EPSS
0.2%
CVE-2026-23949 HIGH POC PATCH This Week

Jaraco.context versions 5.2.0 through 6.0.x contain a path traversal vulnerability in the tarball() function that allows attackers to extract files outside the intended directory when processing malicious tar archives, with public exploit code available. The vulnerability exploits insufficient path validation that fails to properly filter directory traversal sequences like `../`, potentially enabling unauthorized file extraction and nested tarball attacks. This affects all users processing untrusted tar archives with the vulnerable versions.

Path Traversal Jaraco.Context Redhat Suse
NVD GitHub
CVSS 3.1
8.6
EPSS
0.1%
CVE-2026-22218 MEDIUM POC This Month

Authenticated users in Chainlit versions before 2.9.4 can read arbitrary files accessible to the Chainlit service through a path traversal flaw in the element update endpoint. By crafting a malicious Element with a custom path, an attacker retrieves file contents via the /project/file API, enabling disclosure of sensitive data. Public exploit code exists for this vulnerability and no patch is currently available.

Path Traversal AI / ML Chainlit
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-23877 MEDIUM PATCH This Month

Swing Music is a self-hosted music player for local audio files. versions up to 2.1.4 contains a security vulnerability.

Path Traversal Swing Music
NVD GitHub VulDB
CVSS 3.1
4.3
EPSS
0.5%
CVE-2026-23850 HIGH POC PATCH This Week

SiYuan versions before 3.5.4 allow unauthenticated remote attackers to read arbitrary files on the server through improper HTML rendering in the markdown feature. Public exploit code exists for this vulnerability, which has a CVSS score of 7.5. The vulnerability has been patched in version 3.5.4 and later.

Path Traversal Siyuan Suse
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-23644 HIGH POC PATCH This Week

Path traversal in esm.sh CDN prior to version 0.0.0-20260116051925-c62ab83c589e allows unauthenticated remote attackers to write arbitrary files to the server through malicious tar archives, bypassing incomplete path sanitization. Public exploit code exists for this vulnerability. The issue stems from improper validation of absolute paths in tar file entries, enabling potential code execution or service disruption on affected systems.

Golang Github Path Traversal Esm.Sh Suse
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-1111 MEDIUM POC This Month

Path traversal in Sanluan PublicCMS up to version 5.202506.d allows remote attackers with high privileges to manipulate the path parameter in the Task Template Management handler, enabling unauthorized file access or manipulation. Public exploit code exists for this vulnerability, and no patch is currently available from the vendor despite early notification.

Java Path Traversal Publiccms
NVD GitHub VulDB
CVSS 3.1
4.7
EPSS
0.2%
CVE-2026-23535 HIGH PATCH This Week

The wlc Weblate command-line client prior to version 1.17.2 is vulnerable to arbitrary file write attacks through path traversal when downloading multi-translations from a malicious or compromised server. An authenticated attacker can exploit this vulnerability by crafting a specially designed server response to write files to arbitrary locations on the victim's system, potentially compromising system integrity. This vulnerability affects wlc versions before 1.17.2 and is fixed in the patched version.

Path Traversal Wlc
NVD GitHub
CVSS 3.1
8.0
EPSS
0.0%
CVE-2025-68921 HIGH This Week

SteelSeries Nahimic 3 1.10.7 allows Directory traversal. [CVSS 7.8 HIGH]

Path Traversal Nahimic
NVD GitHub
CVSS 3.1
7.8
EPSS
0.1%
CVE-2026-22876 MEDIUM This Month

TOA Corporation TRIFORA 3 series network cameras contain a path traversal vulnerability that allows authenticated users with monitoring privileges or higher to read arbitrary files from the device. An attacker with valid credentials can exploit this flaw to access sensitive information stored on the affected cameras. No patch is currently available for this vulnerability.

Path Traversal
NVD
CVSS 3.0
6.5
EPSS
0.0%
CVE-2026-1022 HIGH This Week

Gotac's Statistics Database System is vulnerable to unauthenticated path traversal attacks that enable remote attackers to read arbitrary files from affected systems without authentication. The vulnerability affects industrial and statistics database deployments, allowing an attacker to download sensitive system files and potentially obtain confidential data. No patch is currently available for this high-severity vulnerability.

Industrial Path Traversal Statistics Database System
NVD
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-1020 MEDIUM This Month

Gotac's Police Statistics Database System contains a path traversal vulnerability that enables unauthenticated remote attackers to enumerate system directories and access sensitive files. The flaw affects industrial and law enforcement deployments with network accessibility, potentially exposing confidential database contents and system architecture details. No patch is currently available for this medium-severity vulnerability.

Industrial Path Traversal Police Statistics Database System
NVD
CVSS 3.1
5.3
EPSS
0.0%
CVE-2026-1018 HIGH This Week

Gotac's Police Statistics Database System is vulnerable to unauthenticated arbitrary file read attacks via absolute path traversal, enabling remote attackers to download sensitive system files without authentication. The vulnerability carries high severity (CVSS 7.5) with broad network accessibility and no user interaction required. No patch is currently available, leaving affected deployments at risk until remediation is released.

Industrial Path Traversal Police Statistics Database System
NVD
CVSS 3.1
7.5
EPSS
0.0%
CVE-2021-47795 MEDIUM POC This Month

GeoVision GeoWebServer 5.3.3 contains multiple vulnerabilities including local file inclusion, cross-site scripting, and remote code execution through improper input sanitization. [CVSS 6.2 MEDIUM]

RCE XSS Lfi Path Traversal
NVD Exploit-DB
CVSS 3.1
6.2
EPSS
0.0%
CVE-2026-22249 HIGH POC PATCH This Week

Docmost versions 0.21.0 through 0.23.x contain a path traversal vulnerability in the zip import feature that allows authenticated attackers to write arbitrary files to the system due to insufficient filename validation. Public exploit code exists for this vulnerability, which could enable attackers to overwrite critical application files or achieve code execution. The vulnerability is patched in version 0.24.0 and affects all installations using the vulnerable import functionality.

Path Traversal Docmost
NVD GitHub
CVSS 3.1
7.1
EPSS
0.0%
CVE-2025-66292 HIGH POC PATCH This Week

DPanel is an open source server management panel written in Go. Prior to 1.9.2, DPanel has an arbitrary file deletion vulnerability in the /api/common/attach/delete interface. [CVSS 8.1 HIGH]

Golang Path Traversal Dpanel Suse
NVD GitHub
CVSS 3.1
8.1
EPSS
0.1%
CVE-2025-67076 HIGH This Week

Directory traversal vulnerability in Omnispace Agora Project before 25.10 allowing unauthenticated attackers to read files on the system via the misc controller and the ExternalGetFile action. Only files with an extension can be read. [CVSS 7.5 HIGH]

Path Traversal Agora Project
NVD
CVSS 3.1
7.5
EPSS
0.2%
CVE-2021-47755 HIGH POC This Week

Oliver Library Server v5 contains a file download vulnerability that allows unauthenticated attackers to access arbitrary system files through unsanitized input in the FileServlet endpoint. [CVSS 7.5 HIGH]

Path Traversal Oliver V5 Library
NVD Exploit-DB
CVSS 3.1
7.5
EPSS
0.1%
CVE-2025-67083 MEDIUM POC This Month

Directory traversal vulnerability in InvoicePlane through 1.6.3 allows unauthenticated attackers to read files from the server. The ability to read files and the file type depends on the web server and its configuration. [CVSS 5.3 MEDIUM]

Path Traversal Invoiceplane
NVD GitHub
CVSS 3.1
5.3
EPSS
0.1%
CVE-2025-13154 MEDIUM This Month

An improper link following vulnerability was reported in the SmartPerformanceAddin for Lenovo Vantage that could allow an authenticated local user to perform an arbitrary file deletion with elevated privileges. [CVSS 5.5 MEDIUM]

Path Traversal
NVD
CVSS 3.1
5.5
EPSS
0.0%
CVE-2025-15486 MEDIUM This Month

The Kunze Law plugin for WordPress is vulnerable to Stored Cross-Site Scripting via plugin's shortcode in all versions up to, and including, 2.1 due to the plugin fetching HTML content from a remote server and injecting it into pages without any sanitization or escaping. [CVSS 4.4 MEDIUM]

WordPress XSS Path Traversal PHP
NVD
CVSS 3.1
4.4
EPSS
0.0%
CVE-2025-15020 MEDIUM This Month

Gotham Block Extra Light (WordPress plugin) versions up to 1.5.0 is affected by path traversal (CVSS 6.5).

WordPress Path Traversal
NVD
CVSS 3.1
6.5
EPSS
0.1%
CVE-2025-14301 CRITICAL Act Now

Integration Opvius AI for WooCommerce (through 1.3.0) has unauthenticated path traversal allowing arbitrary file download and deletion. No authentication, no nonce verification, no path validation.

WordPress PHP Path Traversal
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2022-50939 HIGH POC This Week

e107 CMS version 3.2.1 contains a critical file upload vulnerability that allows authenticated administrators to override arbitrary server files through path traversal. [CVSS 7.2 HIGH]

PHP Path Traversal E107
NVD Exploit-DB
CVSS 3.1
7.2
EPSS
0.7%
CVE-2022-50932 HIGH POC This Week

Kyocera Command Center RX ECOSYS M2035dn contains a directory traversal vulnerability that allows unauthenticated attackers to read sensitive system files by manipulating file paths under the /js/ path. [CVSS 7.5 HIGH]

Path Traversal Command Center Rx
NVD Exploit-DB
CVSS 3.1
7.5
EPSS
0.4%
CVE-2022-50890 HIGH POC This Week

Owlfiles File Manager 12.0.1 contains a path traversal vulnerability in its built-in HTTP server that allows attackers to access system directories. [CVSS 7.5 HIGH]

Path Traversal Owlfiles
NVD Exploit-DB
CVSS 3.1
7.5
EPSS
0.4%
CVE-2021-47751 HIGH POC This Week

CuteEditor for PHP (now referred to as Rich Text Editor) 6.6 contains a directory traversal vulnerability in the browse template feature that allows attackers to write files to arbitrary web root directories. [CVSS 7.5 HIGH]

PHP Path Traversal Rich Text Editor
NVD Exploit-DB
CVSS 3.1
7.5
EPSS
0.3%
CVE-2021-47749 MEDIUM POC This Month

YouPHPTube <= 7.8 contains a local file inclusion vulnerability that allows unauthenticated attackers to access arbitrary files by manipulating the 'lang' parameter in GET requests. [CVSS 5.5 MEDIUM]

PHP Lfi Path Traversal Youphptube
NVD Exploit-DB
CVSS 3.1
5.5
EPSS
0.2%
CVE-2026-22871 CRITICAL PATCH Act Now

GuardDog security scanner before 2.7.1 has a path traversal in safe_extract() that allows malicious PyPI packages to write files outside the extraction directory. Ironic vulnerability in a tool designed to detect malicious packages. Patch available.

RCE Path Traversal AI / ML Guarddog
NVD GitHub
CVSS 3.1
9.8
EPSS
0.6%
CVE-2025-37177 MEDIUM This Month

An arbitrary file deletion vulnerability has been identified in the command-line interface of mobility conductors running either AOS-10 or AOS-8 operating systems. [CVSS 6.5 MEDIUM]

Path Traversal Information Disclosure Arubaos
NVD
CVSS 3.1
6.5
EPSS
0.1%
CVE-2025-14914
EPSS 0% CVSS 7.6
HIGH This Week

IBM WebSphere Application Server Liberty 17.0.0.3 through 26.0.0.1 could allow a privileged user to upload a zip archive containing path traversal sequences resulting in an overwrite of files leading to arbitrary code execution. [CVSS 7.6 HIGH]

IBM Path Traversal Websphere Application Server +1
NVD
CVE-2026-1703
EPSS 0%
PATCH Monitor

When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.

Path Traversal
NVD GitHub
CVE-2026-1186
EPSS 0%
Monitor

EAP Legislator is vulnerable to Path Traversal in file extraction functionality. Attacker can prepare zipx archive (default file type used by the Legislator application) and choose arbitrary path outside the intended directory (e.x.

Path Traversal
NVD
CVE-2022-50950
EPSS 0% CVSS 6.5
MEDIUM This Month

Webile 1.0.1 contains a directory traversal vulnerability that allows remote attackers to manipulate file system paths without authentication. Attackers can exploit path manipulation to access sensitive system directories and potentially compromise the mobile device's local file system. [CVSS 6.5 MEDIUM]

Path Traversal
NVD
CVE-2021-47921
EPSS 0% CVSS 6.5
MEDIUM This Month

Free Photo & Video Vault 0.0.2 contains a directory traversal web vulnerability that allows remote attackers to manipulate application path requests and access sensitive system files. [CVSS 6.5 MEDIUM]

Path Traversal
NVD
CVE-2026-25069
EPSS 0%
POC This Week

SunFounder Pironman Dashboard (pm_dashboard) version 1.3.13 and prior contain a path traversal vulnerability in the log file API endpoints. An unauthenticated remote attacker can supply traversal sequences via the filename parameter to read and delete arbitrary files.

Denial Of Service Path Traversal
NVD GitHub
CVE-2020-37041
EPSS 0% CVSS 7.5
HIGH POC This Week

OpenCTI 3.3.1 is vulnerable to a directory traversal attack via the static/css endpoint. An unauthenticated attacker can read arbitrary files from the filesystem by sending crafted GET requests with path traversal sequences (e.g., '../') in the URL. [CVSS 7.5 HIGH]

Linux Windows Path Traversal +1
NVD GitHub Exploit-DB
CVE-2020-37034
EPSS 0% CVSS 7.5
HIGH POC This Week

HelloWeb 2.0 contains an arbitrary file download vulnerability that allows remote attackers to download system files by manipulating filepath and filename parameters. Attackers can send crafted GET requests to download.asp with directory traversal to access sensitive configuration and system files. [CVSS 7.5 HIGH]

Path Traversal
NVD Exploit-DB
CVE-2026-25152
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

Backstage TechDocs plugin versions prior to 1.13.11 and 1.14.1 contain a path traversal vulnerability that allows authenticated attackers to read arbitrary files from the host filesystem when the local generator is enabled. The vulnerability stems from insufficient symlink validation during the documentation build process, enabling attackers to embed sensitive file contents into generated HTML accessible to documentation viewers. Organizations using `techdocs.generator.runIn: local` with untrusted documentation sources are at risk until patching to the fixed versions.

Node.js Docker Path Traversal +2
NVD GitHub
CVE-2026-22625
EPSS 0% CVSS 4.6
MEDIUM This Month

HIKSEMI NAS devices improperly validate filenames, allowing attackers with physical access to traverse directory structures and read sensitive system files. This vulnerability affects confidentiality but requires local presence and no authentication, making it a risk primarily in physically accessible environments. No patch is currently available for this issue.

Path Traversal
NVD
CVE-2026-0963
EPSS 0% CVSS 9.9
CRITICAL Act Now

Path traversal in Crafty Controller game server management allows authenticated attackers to read/write files outside the intended directory. CVSS 9.9 with scope change.

RCE Path Traversal Crafty Controller
NVD
CVE-2026-0805
EPSS 0% CVSS 8.2
HIGH This Week

Remote code execution in Crafty Controller's Backup Configuration feature results from insufficient path traversal validation, enabling authenticated attackers to manipulate files and execute arbitrary code on affected systems. The vulnerability requires valid credentials and specific conditions to exploit but carries high impact due to its ability to compromise system integrity and confidentiality. No patch is currently available.

RCE Path Traversal Crafty Controller
NVD
CVE-2026-25116
EPSS 0% CVSS 7.6
HIGH POC This Week

Runtipi versions 4.5.0 through 4.7.1 contain an unauthenticated path traversal vulnerability in the UserConfigController that allows remote attackers to overwrite the docker-compose.yml configuration file through insecure URN parsing. An attacker can inject a malicious stack configuration that executes arbitrary code when the instance restarts, achieving full remote code execution and host compromise. Public exploit code exists and no patch is currently available.

Docker RCE Path Traversal +1
NVD GitHub
CVE-2026-24846
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

malcontent discovers supply-chain compromises through. context, differential analysis, and YARA. [CVSS 5.5 MEDIUM]

Path Traversal Malcontent Suse
NVD GitHub
CVE-2026-24687
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

Authenticated users in Umbraco Forms versions 16 and 17 can exploit a path traversal vulnerability to read arbitrary files on Mac and Linux systems running the CMS. An attacker with backoffice access can enumerate and access sensitive files through the export endpoint by manipulating the fileName parameter. No patch is currently available, though the vulnerability is mitigated by restricting backoffice access and blocking path traversal sequences at the WAF level.

Linux Path Traversal Umbraco Forms
NVD GitHub
CVE-2025-15543
EPSS 0% CVSS 4.6
MEDIUM This Month

Improper link resolution in USB HTTP access path in VX800v v1.0 allows a crafted USB device to expose root filesystem contents, giving an attacker with physical access read‑only access to system files. [CVSS 4.6 MEDIUM]

Path Traversal Vx800v Firmware
NVD
CVE-2025-15541
EPSS 0% CVSS 6.3
MEDIUM This Month

Improper link resolution in the VX800v v1.0 SFTP service allows authenticated adjacent attackers to use crafted symbolic links to access system files, resulting in high confidentiality impact and limited integrity risk. [CVSS 6.3 MEDIUM]

Path Traversal Vx800v Firmware
NVD
CVE-2020-37015
EPSS 0% CVSS 7.5
HIGH POC This Week

Ruijie Networks Switch eWeb S29_RGOS 11.4 contains a directory traversal vulnerability that allows unauthenticated attackers to access sensitive configuration files by manipulating file path parameters. [CVSS 7.5 HIGH]

Path Traversal
NVD Exploit-DB
CVE-2026-1616
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Open Security Issue Management (OSIM) prior to v2025.9.0 contains a path traversal vulnerability in its nginx configuration that improperly concatenates URI and query string parameters, allowing unauthenticated remote attackers to access unauthorized files and directories. The vulnerability affects both OSIM and Nginx deployments using vulnerable configurations, enabling information disclosure through crafted query parameters. A patch is available for affected versions.

Nginx Path Traversal Open Security Issue Management
NVD GitHub
CVE-2026-1588
EPSS 0% CVSS 2.7
LOW POC Monitor

A vulnerability was found in jishenghua jshERP up to 3.6. The impacted element is the function install of the file /jshERP-boot/plugin/installByPath of the component com.gitee.starblues.integration.operator.DefaultPluginOperator. [CVSS 2.7 LOW]

Path Traversal
NVD GitHub VulDB
CVE-2026-1549
EPSS 0% CVSS 4.3
MEDIUM POC This Month

jshERP versions up to 3.6 contain a path traversal vulnerability in the PluginController's file upload functionality that allows authenticated attackers to read arbitrary files on the server. Public exploit code exists for this vulnerability, and the vendor has not yet released a patch despite being notified of the issue.

Path Traversal Jsherp
NVD GitHub VulDB
CVE-2026-1532
EPSS 0% CVSS 2.4
LOW POC Monitor

A vulnerability was identified in D-Link DCS-700L 1.03.09. The affected element is the function uploadmusic of the file /setUploadMusic of the component Music File Upload Service. [CVSS 2.4 LOW]

D-Link Path Traversal
NVD VulDB
CVE-2025-69601
EPSS 0% CVSS 6.5
MEDIUM POC This Month

A directory traversal (Zip Slip) vulnerability exists in the “Static Sites” feature of 66biolinks v44.0.0 by AltumCode. Uploaded ZIP archives are automatically extracted without validating or sanitizing file paths. [CVSS 6.5 MEDIUM]

Path Traversal 66biolinks
NVD GitHub
CVE-2020-36973
EPSS 0% CVSS 6.5
MEDIUM POC This Month

PDW File Browser 1.3 contains a remote code execution vulnerability that allows authenticated users to upload and rename webshell files to arbitrary web server locations. [CVSS 6.5 MEDIUM]

PHP RCE Path Traversal
NVD GitHub Exploit-DB
CVE-2026-24842
EPSS 0% CVSS 8.2
HIGH POC PATCH This Week

node-tar before version 7.5.7 contains a path traversal vulnerability where inconsistent path resolution between validation and execution logic allows attackers to bypass security checks and create hardlinks to arbitrary files outside the intended extraction directory. Public exploit code exists for this vulnerability, affecting Node.js applications that process untrusted TAR archives. An attacker can craft a malicious TAR file to write to sensitive locations on the system.

D-Link Node.js Industrial +4
NVD GitHub VulDB
CVE-2026-24909
EPSS 0% CVSS 5.9
MEDIUM PATCH This Month

Path traversal in vlt versions before 1.0.0-rc.10 allows local attackers to write files outside their intended directories during tar archive extraction due to insufficient path sanitization. An attacker with local access could exploit this to overwrite arbitrary files on the system with elevated scope impact. No patch is currently available for this vulnerability.

Path Traversal
NVD GitHub
CVE-2026-24741
EPSS 0% CVSS 8.1
HIGH POC PATCH This Week

Arbitrary file deletion in ConvertX prior to version 0.17.0 allows authenticated attackers to remove files outside the intended upload directory by exploiting insufficient path validation in the POST /delete endpoint. The vulnerability enables attackers to supply path traversal sequences that bypass directory restrictions, with impact limited only by server process permissions. Public exploit code exists for this HIGH severity flaw, though a patch is available in version 0.17.0.

Path Traversal Convertx
NVD GitHub
CVE-2026-23593
EPSS 0% CVSS 7.5
HIGH This Week

web-based management interface of HPE Aruba Networking Fabric Composer is affected by path traversal (CVSS 7.5).

Path Traversal
NVD
CVE-2020-36939
EPSS 1% CVSS 7.5
HIGH POC This Week

Cassandra Web 0.5.0 contains a directory traversal vulnerability that allows unauthenticated attackers to read arbitrary files by manipulating path traversal parameters. [CVSS 7.5 HIGH]

Apache Path Traversal
NVD GitHub Exploit-DB
CVE-2026-24801
EPSS 0%
Monitor

Vulnerability in Ralim IronOS (source/Core/BSP/Pinecilv2/bl_mcu_sdk/components/ble/ble_stack/common/tinycrypt/source modules). This vulnerability is associated with program files ecc_dsa.C.

Path Traversal
NVD GitHub
CVE-2026-24486
EPSS 0% CVSS 8.6
HIGH POC PATCH This Week

Arbitrary file write in Python-Multipart versions before 0.0.22 allows remote attackers to store uploaded files to any filesystem location when non-default configuration options UPLOAD_DIR and UPLOAD_KEEP_FILENAME=True are enabled. An attacker can exploit this path traversal vulnerability by crafting malicious filenames in multipart uploads, potentially overwriting critical system or application files. Public exploit code exists for this vulnerability; affected users should upgrade to version 0.0.22 or disable UPLOAD_KEEP_FILENAME=True as an interim mitigation.

Python Path Traversal Python Multipart +2
NVD GitHub
CVE-2026-24479
EPSS 1% CVSS 9.8
CRITICAL PATCH Act Now

HUSTOJ online judge has a path traversal vulnerability enabling arbitrary file access on the competition server.

Linux PHP MySQL +3
NVD GitHub
CVE-2026-24478
EPSS 0% CVSS 7.2
HIGH POC This Week

AnythingLLM versions prior to 1.10.0 contain a path traversal vulnerability in the DrupalWiki integration that allows malicious administrators or attackers with admin privileges to write arbitrary files to the server, potentially achieving remote code execution through configuration file overwriting or malicious script injection. Public exploit code exists for this vulnerability, and no patch is currently available for affected deployments. The attack requires high-level privileges but carries critical risk due to the ability to completely compromise server integrity.

Drupal RCE Path Traversal +2
NVD GitHub
CVE-2026-24123
EPSS 0% CVSS 7.4
HIGH PATCH This Week

BentoML versions prior to 1.4.34 allow path traversal attacks through improperly validated file path fields in bentofile.yaml configurations, enabling attackers to embed arbitrary files from the victim's system into bento archives during the build process. This vulnerability can be exploited to exfiltrate sensitive data such as credentials, SSH keys, and environment variables into supply chain artifacts that may be pushed to registries or deployed in production environments. A patch is available in version 1.4.34.

Python Docker Path Traversal +2
NVD GitHub
CVE-2026-23890
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

Pnpm versions up to 10.28.1 contains a vulnerability that allows attackers to overwriting config files, scripts, or other sensitive files (CVSS 6.5).

Node.js Path Traversal Pnpm +2
NVD GitHub
CVE-2026-23889
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

Path traversal in pnpm's tarball extraction on Windows allows attackers to write files outside the intended package directory by exploiting incomplete path normalization that fails to block backslash-based traversal sequences. Public exploit code exists for this vulnerability, which affects Windows developers and CI/CD pipelines (GitHub Actions, Azure DevOps) and could result in overwriting sensitive configuration files like .npmrc or build configurations. A patch is available in pnpm version 10.28.1 and later.

Windows Node.js Azure +4
NVD GitHub
CVE-2026-23888
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

Path traversal in pnpm's binary fetcher (versions prior to 10.28.1) allows attackers to write files outside the intended extraction directory through malicious ZIP entries or crafted prefix values, potentially overwriting critical configuration files and scripts on affected systems. All pnpm users installing packages with binary assets are vulnerable, particularly those in CI/CD pipelines or with custom Node.js binary configurations. Public exploit code exists for this medium-severity vulnerability.

Node.js Path Traversal Pnpm +2
NVD GitHub
CVE-2025-59099
EPSS 0%
Monitor

The Access Manager is using the open source web server CompactWebServer written in C#. This web server is affected by a path traversal vulnerability, which allows an attacker to directly access files via simple GET requests without prior authentication.

SQLi Denial Of Service Path Traversal
NVD
CVE-2026-24469
EPSS 0% CVSS 7.5
HIGH This Week

C++ HTTP Server versions 1.0 and below suffer from a path traversal vulnerability in the RequestHandler::handleRequest method that permits unauthenticated remote attackers to read arbitrary files from the server filesystem through malicious HTTP GET requests containing directory traversal sequences. The vulnerability stems from insufficient input validation on the URL path, which is directly concatenated to the base directory without sanitization. No patch is currently available.

Path Traversal
NVD GitHub
CVE-2021-47903
EPSS 0% CVSS 8.8
HIGH POC This Week

LiteSpeed Web Server Enterprise 5.4.11 contains an authenticated command injection vulnerability in the external app configuration interface. [CVSS 8.8 HIGH]

RCE Path Traversal Command Injection
NVD Exploit-DB
CVE-2025-11002
EPSS 0% CVSS 7.8
HIGH PATCH This Week

7-Zip ZIP File Parsing Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of 7-Zip. [CVSS 7.8 HIGH]

RCE Path Traversal 7 Zip +1
NVD
CVE-2026-20613
EPSS 0% CVSS 7.8
HIGH POC This Week

Path traversal in the ArchiveReader.extractContents() function used by container image load operations allows local attackers to write arbitrary files to any user-writable location on the system by crafting malicious archives with relative pathnames. Public exploit code exists for this vulnerability, and affected users cannot currently patch as fixes are only available in container 0.8.0 and containerization 0.21.0. The vulnerability requires local access and user interaction but carries high severity due to potential for file overwrite and system compromise.

Path Traversal Containerization Container
NVD GitHub
CVE-2026-21227
EPSS 0% CVSS 8.2
HIGH This Week

Privilege escalation in Azure Logic Apps results from improper path validation, enabling remote attackers to gain elevated access without authentication or user interaction. Organizations using Azure Logic Apps are at risk of unauthorized privilege elevation through network-based attacks, with no available patch currently provided.

Azure Path Traversal Azure Logic Apps
NVD
CVE-2026-23954
EPSS 0% CVSS 8.7
HIGH POC PATCH This Week

Incus is a system container and virtual machine manager. [CVSS 8.7 HIGH]

Path Traversal Incus Suse
NVD GitHub
CVE-2025-69097
EPSS 0% CVSS 8.1
HIGH This Week

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in VibeThemes WPLMS wplms_plugin allows Path Traversal.This issue affects WPLMS: from n/a through <= 1.9.9.5.4. [CVSS 8.1 HIGH]

Path Traversal
NVD
CVE-2025-69055
EPSS 0% CVSS 6.5
MEDIUM This Month

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in SeaTheme BM Content Builder allows Path Traversal.This issue affects BM Content Builder: from n/a before 3.16.3.3. [CVSS 6.5 MEDIUM]

Path Traversal
NVD
CVE-2025-68912
EPSS 0% CVSS 8.6
HIGH This Week

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Harmonic Design HDForms hdforms allows Path Traversal.This issue affects HDForms: from n/a through <= 1.6.1. [CVSS 8.6 HIGH]

Path Traversal
NVD
CVE-2025-68907
EPSS 0% CVSS 7.5
HIGH This Week

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in AivahThemes Hostme v2 hostmev2 allows Path Traversal.This issue affects Hostme v2: from n/a through <= 7.0. [CVSS 7.5 HIGH]

Path Traversal
NVD
CVE-2025-68902
EPSS 0% CVSS 7.3
HIGH This Week

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in AivahThemes Anona anona allows Path Traversal.This issue affects Anona: from n/a through <= 8.0. [CVSS 7.3 HIGH]

Path Traversal
NVD
CVE-2025-68901
EPSS 0% CVSS 8.6
HIGH This Week

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in AivahThemes Anona anona allows Path Traversal.This issue affects Anona: from n/a through <= 8.0. [CVSS 8.6 HIGH]

Path Traversal
NVD
CVE-2025-67963
EPSS 0% CVSS 8.6
HIGH This Week

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in ovatheme Movie Booking movie-booking allows Path Traversal.This issue affects Movie Booking: from n/a through <= 1.1.5. [CVSS 8.6 HIGH]

Path Traversal
NVD
CVE-2023-7335
EPSS 0%
POC This Week

EduSoho versions prior to 22.4.7 contain an arbitrary file read vulnerability in the classroom-course-statistics export functionality.

Industrial Path Traversal
NVD GitHub
CVE-2025-69820
EPSS 0% CVSS 6.0
MEDIUM POC PATCH This Month

Directory Traversal vulnerability in Beam beta9 v.0.1.521 allows a remote attacker to obtain sensitive information via the joinCleanPath function. [CVSS 6.0 MEDIUM]

Path Traversal Beta9 Suse
NVD GitHub
CVE-2025-69612
EPSS 0% CVSS 6.5
MEDIUM POC This Month

A path traversal vulnerability exists in TMS Management Console (version 6.3.7.27386.20250818) from TMS Global Software. [CVSS 6.5 MEDIUM]

Path Traversal Tms Management Console
NVD GitHub
CVE-2025-67684
EPSS 1% CVSS 7.2
HIGH This Week

Quick.Cart is vulnerable to Local File Inclusion and Path Traversal issues in the theme selection mechanism. Quick.Cart allows a privileged user to upload arbitrary file contents while only validating the filename extension. [CVSS 7.2 HIGH]

PHP RCE Lfi +2
NVD
CVE-2026-1330
EPSS 0% CVSS 7.5
HIGH This Week

MeetingHub Paperless Meetings contains an arbitrary file read vulnerability that enables unauthenticated remote attackers to download sensitive system files through path traversal exploitation. The vulnerability affects all installations without authentication requirements, allowing attackers to access confidential data with high confidentiality impact. No patch is currently available for this issue.

Path Traversal Meetinghub Paperless Meetings
NVD
CVE-2026-24047
EPSS 0% CVSS 6.3
MEDIUM PATCH This Month

The resolveSafeChildPath function in Backstage's backend-plugin-api prior to version 0.1.17 improperly validates symlink chains and dangling symlinks, allowing authenticated attackers to bypass path traversal protections used by Scaffolder actions and other backend components. An attacker with low privileges could exploit this to access files outside the intended directory boundaries by chaining intermediate symlinks or creating symlinks pointing to non-existent paths that are later materialized during file operations. This affects Backstage installations relying on the vulnerable path validation function for security isolation.

Path Traversal Redhat
NVD GitHub
CVE-2026-24046
EPSS 0% CVSS 7.1
HIGH PATCH This Week

Backstage Scaffolder actions and archive extraction utilities are vulnerable to symlink-based path traversal attacks, allowing authenticated users with template creation privileges to read sensitive files, delete arbitrary files outside the workspace, or write malicious files via crafted symlinks in tar/zip archives. This affects deployments where users can create or execute Scaffolder templates, with no patch currently available for versions prior to @backstage/backend-defaults 0.12.2.

Path Traversal Redhat
NVD GitHub
CVE-2021-47850
EPSS 1% CVSS 7.5
HIGH POC This Week

Mini Mouse 9.2.0 contains a path traversal vulnerability that allows remote attackers to access arbitrary system files and directories through crafted HTTP requests. [CVSS 7.5 HIGH]

Path Traversal Mini Mouse
NVD Exploit-DB
CVE-2021-47849
EPSS 0% CVSS 6.2
MEDIUM POC This Month

Mini Mouse 9.3.0 contains a path traversal vulnerability that allows attackers to access sensitive system directories through the device information endpoint. Attackers can retrieve file lists from system directories like /usr, /etc, and /var by manipulating file path parameters in API requests. [CVSS 6.2 MEDIUM]

Path Traversal Mini Mouse
NVD Exploit-DB
CVE-2021-47746
EPSS 0% CVSS 7.5
HIGH POC This Week

NodeBB Plugin Emoji 3.2.1 contains an arbitrary file write vulnerability that allows administrative users to write files to arbitrary system locations through the emoji upload API. [CVSS 7.5 HIGH]

Path Traversal
NVD GitHub Exploit-DB
CVE-2026-23949
EPSS 0% CVSS 8.6
HIGH POC PATCH This Week

Jaraco.context versions 5.2.0 through 6.0.x contain a path traversal vulnerability in the tarball() function that allows attackers to extract files outside the intended directory when processing malicious tar archives, with public exploit code available. The vulnerability exploits insufficient path validation that fails to properly filter directory traversal sequences like `../`, potentially enabling unauthorized file extraction and nested tarball attacks. This affects all users processing untrusted tar archives with the vulnerable versions.

Path Traversal Jaraco.Context Redhat +1
NVD GitHub
CVE-2026-22218
EPSS 0% CVSS 6.5
MEDIUM POC This Month

Authenticated users in Chainlit versions before 2.9.4 can read arbitrary files accessible to the Chainlit service through a path traversal flaw in the element update endpoint. By crafting a malicious Element with a custom path, an attacker retrieves file contents via the /project/file API, enabling disclosure of sensitive data. Public exploit code exists for this vulnerability and no patch is currently available.

Path Traversal AI / ML Chainlit
NVD GitHub
CVE-2026-23877
EPSS 0% CVSS 4.3
MEDIUM PATCH This Month

Swing Music is a self-hosted music player for local audio files. versions up to 2.1.4 contains a security vulnerability.

Path Traversal Swing Music
NVD GitHub VulDB
CVE-2026-23850
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

SiYuan versions before 3.5.4 allow unauthenticated remote attackers to read arbitrary files on the server through improper HTML rendering in the markdown feature. Public exploit code exists for this vulnerability, which has a CVSS score of 7.5. The vulnerability has been patched in version 3.5.4 and later.

Path Traversal Siyuan Suse
NVD GitHub
CVE-2026-23644
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

Path traversal in esm.sh CDN prior to version 0.0.0-20260116051925-c62ab83c589e allows unauthenticated remote attackers to write arbitrary files to the server through malicious tar archives, bypassing incomplete path sanitization. Public exploit code exists for this vulnerability. The issue stems from improper validation of absolute paths in tar file entries, enabling potential code execution or service disruption on affected systems.

Golang Github Path Traversal +2
NVD GitHub
CVE-2026-1111
EPSS 0% CVSS 4.7
MEDIUM POC This Month

Path traversal in Sanluan PublicCMS up to version 5.202506.d allows remote attackers with high privileges to manipulate the path parameter in the Task Template Management handler, enabling unauthorized file access or manipulation. Public exploit code exists for this vulnerability, and no patch is currently available from the vendor despite early notification.

Java Path Traversal Publiccms
NVD GitHub VulDB
CVE-2026-23535
EPSS 0% CVSS 8.0
HIGH PATCH This Week

The wlc Weblate command-line client prior to version 1.17.2 is vulnerable to arbitrary file write attacks through path traversal when downloading multi-translations from a malicious or compromised server. An authenticated attacker can exploit this vulnerability by crafting a specially designed server response to write files to arbitrary locations on the victim's system, potentially compromising system integrity. This vulnerability affects wlc versions before 1.17.2 and is fixed in the patched version.

Path Traversal Wlc
NVD GitHub
CVE-2025-68921
EPSS 0% CVSS 7.8
HIGH This Week

SteelSeries Nahimic 3 1.10.7 allows Directory traversal. [CVSS 7.8 HIGH]

Path Traversal Nahimic
NVD GitHub
CVE-2026-22876
EPSS 0% CVSS 6.5
MEDIUM This Month

TOA Corporation TRIFORA 3 series network cameras contain a path traversal vulnerability that allows authenticated users with monitoring privileges or higher to read arbitrary files from the device. An attacker with valid credentials can exploit this flaw to access sensitive information stored on the affected cameras. No patch is currently available for this vulnerability.

Path Traversal
NVD
CVE-2026-1022
EPSS 0% CVSS 7.5
HIGH This Week

Gotac's Statistics Database System is vulnerable to unauthenticated path traversal attacks that enable remote attackers to read arbitrary files from affected systems without authentication. The vulnerability affects industrial and statistics database deployments, allowing an attacker to download sensitive system files and potentially obtain confidential data. No patch is currently available for this high-severity vulnerability.

Industrial Path Traversal Statistics Database System
NVD
CVE-2026-1020
EPSS 0% CVSS 5.3
MEDIUM This Month

Gotac's Police Statistics Database System contains a path traversal vulnerability that enables unauthenticated remote attackers to enumerate system directories and access sensitive files. The flaw affects industrial and law enforcement deployments with network accessibility, potentially exposing confidential database contents and system architecture details. No patch is currently available for this medium-severity vulnerability.

Industrial Path Traversal Police Statistics Database System
NVD
CVE-2026-1018
EPSS 0% CVSS 7.5
HIGH This Week

Gotac's Police Statistics Database System is vulnerable to unauthenticated arbitrary file read attacks via absolute path traversal, enabling remote attackers to download sensitive system files without authentication. The vulnerability carries high severity (CVSS 7.5) with broad network accessibility and no user interaction required. No patch is currently available, leaving affected deployments at risk until remediation is released.

Industrial Path Traversal Police Statistics Database System
NVD
CVE-2021-47795
EPSS 0% CVSS 6.2
MEDIUM POC This Month

GeoVision GeoWebServer 5.3.3 contains multiple vulnerabilities including local file inclusion, cross-site scripting, and remote code execution through improper input sanitization. [CVSS 6.2 MEDIUM]

RCE XSS Lfi +1
NVD Exploit-DB
CVE-2026-22249
EPSS 0% CVSS 7.1
HIGH POC PATCH This Week

Docmost versions 0.21.0 through 0.23.x contain a path traversal vulnerability in the zip import feature that allows authenticated attackers to write arbitrary files to the system due to insufficient filename validation. Public exploit code exists for this vulnerability, which could enable attackers to overwrite critical application files or achieve code execution. The vulnerability is patched in version 0.24.0 and affects all installations using the vulnerable import functionality.

Path Traversal Docmost
NVD GitHub
CVE-2025-66292
EPSS 0% CVSS 8.1
HIGH POC PATCH This Week

DPanel is an open source server management panel written in Go. Prior to 1.9.2, DPanel has an arbitrary file deletion vulnerability in the /api/common/attach/delete interface. [CVSS 8.1 HIGH]

Golang Path Traversal Dpanel +1
NVD GitHub
CVE-2025-67076
EPSS 0% CVSS 7.5
HIGH This Week

Directory traversal vulnerability in Omnispace Agora Project before 25.10 allowing unauthenticated attackers to read files on the system via the misc controller and the ExternalGetFile action. Only files with an extension can be read. [CVSS 7.5 HIGH]

Path Traversal Agora Project
NVD
CVE-2021-47755
EPSS 0% CVSS 7.5
HIGH POC This Week

Oliver Library Server v5 contains a file download vulnerability that allows unauthenticated attackers to access arbitrary system files through unsanitized input in the FileServlet endpoint. [CVSS 7.5 HIGH]

Path Traversal Oliver V5 Library
NVD Exploit-DB
CVE-2025-67083
EPSS 0% CVSS 5.3
MEDIUM POC This Month

Directory traversal vulnerability in InvoicePlane through 1.6.3 allows unauthenticated attackers to read files from the server. The ability to read files and the file type depends on the web server and its configuration. [CVSS 5.3 MEDIUM]

Path Traversal Invoiceplane
NVD GitHub
CVE-2025-13154
EPSS 0% CVSS 5.5
MEDIUM This Month

An improper link following vulnerability was reported in the SmartPerformanceAddin for Lenovo Vantage that could allow an authenticated local user to perform an arbitrary file deletion with elevated privileges. [CVSS 5.5 MEDIUM]

Path Traversal
NVD
CVE-2025-15486
EPSS 0% CVSS 4.4
MEDIUM This Month

The Kunze Law plugin for WordPress is vulnerable to Stored Cross-Site Scripting via plugin's shortcode in all versions up to, and including, 2.1 due to the plugin fetching HTML content from a remote server and injecting it into pages without any sanitization or escaping. [CVSS 4.4 MEDIUM]

WordPress XSS Path Traversal +1
NVD
CVE-2025-15020
EPSS 0% CVSS 6.5
MEDIUM This Month

Gotham Block Extra Light (WordPress plugin) versions up to 1.5.0 is affected by path traversal (CVSS 6.5).

WordPress Path Traversal
NVD
CVE-2025-14301
EPSS 0% CVSS 9.8
CRITICAL Act Now

Integration Opvius AI for WooCommerce (through 1.3.0) has unauthenticated path traversal allowing arbitrary file download and deletion. No authentication, no nonce verification, no path validation.

WordPress PHP Path Traversal
NVD
CVE-2022-50939
EPSS 1% CVSS 7.2
HIGH POC This Week

e107 CMS version 3.2.1 contains a critical file upload vulnerability that allows authenticated administrators to override arbitrary server files through path traversal. [CVSS 7.2 HIGH]

PHP Path Traversal E107
NVD Exploit-DB
CVE-2022-50932
EPSS 0% CVSS 7.5
HIGH POC This Week

Kyocera Command Center RX ECOSYS M2035dn contains a directory traversal vulnerability that allows unauthenticated attackers to read sensitive system files by manipulating file paths under the /js/ path. [CVSS 7.5 HIGH]

Path Traversal Command Center Rx
NVD Exploit-DB
CVE-2022-50890
EPSS 0% CVSS 7.5
HIGH POC This Week

Owlfiles File Manager 12.0.1 contains a path traversal vulnerability in its built-in HTTP server that allows attackers to access system directories. [CVSS 7.5 HIGH]

Path Traversal Owlfiles
NVD Exploit-DB
CVE-2021-47751
EPSS 0% CVSS 7.5
HIGH POC This Week

CuteEditor for PHP (now referred to as Rich Text Editor) 6.6 contains a directory traversal vulnerability in the browse template feature that allows attackers to write files to arbitrary web root directories. [CVSS 7.5 HIGH]

PHP Path Traversal Rich Text Editor
NVD Exploit-DB
CVE-2021-47749
EPSS 0% CVSS 5.5
MEDIUM POC This Month

YouPHPTube <= 7.8 contains a local file inclusion vulnerability that allows unauthenticated attackers to access arbitrary files by manipulating the 'lang' parameter in GET requests. [CVSS 5.5 MEDIUM]

PHP Lfi Path Traversal +1
NVD Exploit-DB
CVE-2026-22871
EPSS 1% CVSS 9.8
CRITICAL PATCH Act Now

GuardDog security scanner before 2.7.1 has a path traversal in safe_extract() that allows malicious PyPI packages to write files outside the extraction directory. Ironic vulnerability in a tool designed to detect malicious packages. Patch available.

RCE Path Traversal AI / ML +1
NVD GitHub
CVE-2025-37177
EPSS 0% CVSS 6.5
MEDIUM This Month

An arbitrary file deletion vulnerability has been identified in the command-line interface of mobility conductors running either AOS-10 or AOS-8 operating systems. [CVSS 6.5 MEDIUM]

Path Traversal Information Disclosure Arubaos
NVD
Prev Page 7 of 20 Next

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy