Path Traversal

web HIGH

Path traversal exploits occur when applications use user-controlled input to construct file system paths without proper validation.

How It Works

Path traversal exploits occur when applications use user-controlled input to construct file system paths without proper validation. Attackers inject special sequences like ../ (dot-dot-slash) to escape the intended directory and navigate to arbitrary locations in the file system. Each ../ sequence moves up one directory level, allowing an attacker to break out of a restricted folder and access sensitive files elsewhere on the server.

Attackers employ various encoding techniques to bypass basic filters. Simple URL encoding transforms ../ into %2e%2e%2f, while double encoding becomes %252e%252e%252f (encoding the percent sign itself). Other evasion methods include nested sequences like ....// (which become ../ after filter removal), null byte injection (%00 to truncate path validation), and OS-specific path separators (backslashes on Windows). Absolute paths like /etc/passwd may also work if the application doesn't enforce relative path constraints.

The typical attack flow begins with identifying input parameters that reference files—such as file=, path=, template=, or page=. The attacker then tests various traversal payloads to determine if path validation exists and what depth is needed to reach system files. Success means reading configuration files, credentials, source code, or even writing malicious files if the application allows file uploads or modifications.

Impact

  • Credential exposure: Access to configuration files containing database passwords, API keys, and authentication tokens
  • Source code disclosure: Reading application code reveals business logic, additional vulnerabilities, and hardcoded secrets
  • System file access: Retrieving /etc/passwd, /etc/shadow, or Windows SAM files for credential cracking
  • Configuration tampering: If write access exists, attackers modify settings or inject malicious code
  • Remote code execution: Writing web shells or executable files to web-accessible directories enables full system compromise

Real-World Examples

ZendTo file sharing application (CVE-2025-34508) contained a path traversal vulnerability allowing unauthenticated attackers to read arbitrary files from the server. The flaw existed in file retrieval functionality where user input directly influenced file path construction without adequate validation, exposing sensitive configuration data and potentially system files.

Web application frameworks frequently suffer from path traversal in template rendering engines. When applications allow users to specify template names or include files, insufficient validation permits attackers to read source code from other application modules or framework configuration files, revealing database credentials and session secrets.

File download features in content management systems represent another common vector. Applications that serve user-requested files from disk often fail to restrict paths properly, enabling attackers to download backup files, logs containing sensitive data, or administrative scripts that weren't intended for public access.

Mitigation

  • Avoid user input in file paths: Use indirect references like database IDs mapped to filenames on the server side
  • Canonicalize and validate: Convert paths to absolute canonical form, then verify they remain within the allowed base directory
  • Allowlist permitted files: Maintain an explicit list of accessible files rather than trying to blocklist malicious patterns
  • Chroot jails or sandboxing: Restrict application file system access to specific directories at the OS level
  • Strip dangerous sequences: Remove ../, ..\\, and encoded variants, though this alone is insufficient

Recent CVEs (1798)

CVE-2026-3838
EPSS 2% CVSS 8.8
HIGH This Week

Critical path traversal vulnerability in Unraid's update.php file that allows authenticated remote attackers to execute arbitrary code as root. The vulnerability affects all versions of Unraid (per CPE data) and was discovered by Zero Day Initiative (ZDI-CAN-28951). With a CVSS score of 8.8 and requiring only low privileges, this represents a severe risk for Unraid installations.

PHP Path Traversal RCE +1
NVD VulDB
CVE-2026-30853
EPSS 0% CVSS 5.0
MEDIUM This Month

Arbitrary file write vulnerability in Calibre's RocketBook input plugin enables attackers to write files to any location accessible by the Calibre process when a user opens or converts a malicious .rb file. The path traversal flaw affects versions prior to 9.5.0 and represents an unpatched instance of the same vulnerability class previously fixed in the PDB reader component. Local attackers can leverage this to corrupt files, modify configuration, or potentially achieve code execution depending on file system permissions.

Path Traversal Calibre
NVD GitHub VulDB
CVE-2026-30914
EPSS 0% CVSS 8.1
HIGH PATCH This Week

SFTPGo versions prior to 2.7.1 contain a path normalization vulnerability (CWE-22: Improper Limitation of a Pathname to a Restricted Directory) that allows authenticated attackers to bypass folder-level permissions and escape Virtual Folder boundaries through crafted file paths. An attacker with valid credentials can exploit this authorization bypass to access files and directories beyond their intended scope. The vulnerability has been patched in version 2.7.1 with strict edge-level path normalization, and while no public POC or KEV status has been disclosed, the CVSS 5.3 (network-accessible, low complexity) and requirement for prior authentication suggest this is a real but moderate-priority issue.

Canonical Path Traversal
NVD GitHub VulDB
CVE-2026-4092
EPSS 1% CVSS 8.7
HIGH POC PATCH This Week

Remote code execution in Clasp versions below 3.2.0 allows unauthenticated attackers to execute arbitrary code by uploading Google Apps Script projects with specially crafted filenames that exploit path traversal weaknesses. Public exploit code exists for this vulnerability, and no patch is currently available. The attack requires minimal user interaction and affects Google's Clasp tooling across all configurations.

Path Traversal RCE Google +1
NVD GitHub VulDB
CVE-2026-31886
EPSS 0% CVSS 9.1
CRITICAL Act Now

Path traversal via dagRunId in DAG execution endpoints.

Python Authentication Bypass Denial Of Service +2
NVD GitHub VulDB
CVE-2025-66249
EPSS 0% CVSS 6.3
MEDIUM PATCH This Month

Apache Livy versions 0.3.0 through 0.8.x contain a path traversal vulnerability (CWE-22) that allows authenticated attackers to bypass directory restrictions and access files outside intended whitelist boundaries. The vulnerability only manifests when the 'livy.file.local-dir-whitelist' configuration parameter is set to a non-default value, enabling attackers with valid credentials to read, write, or execute arbitrary files on the server. With a CVSS score of 6.3 (moderate severity) reflecting the requirement for authenticated access and limited impact scope, this vulnerability warrants prioritization for organizations using Livy in multi-tenant or untrusted user environments.

Path Traversal Apache Apache Livy
NVD VulDB
CVE-2026-32415
EPSS 0% CVSS 5.0
MEDIUM This Month

Squeeze versions 1.7.7 and earlier contain a path traversal vulnerability that allows authenticated attackers to access files outside the intended directory through manipulated file paths. An attacker with valid credentials could leverage this flaw to read sensitive files on the affected system, though code execution and data modification are not possible.

Path Traversal Squeeze
NVD VulDB
CVE-2026-23942
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

The Erlang OTP ssh_sftpd module contains a path traversal vulnerability in the is_within_root/2 function that uses string prefix matching instead of proper path component validation to verify if accessed paths are within the configured root directory. An authenticated SFTP user can exploit this to access sibling directories sharing a common name prefix with the root directory (for example, if root is /home/user1, accessing /home/user10 or /home/user1_backup would succeed when it should fail). This vulnerability affects OTP versions 17.0 through 28.4.1 with corresponding SSH versions 3.0.1 through 5.5.1, with no confirmed active exploitation in the wild (KEV status not indicated as actively exploited) but with a moderate CVSS score of 5.3 reflecting the requirement for prior authentication.

Path Traversal Suse
NVD VulDB GitHub
CVE-2026-32274
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Black writes a cache file, the name of which is computed from various formatting options. The value of the `--python-cell-magics` option was placed in the filename without sanitization, which allowed an attacker who controls the value of this argument to write cache files to arbitrary file system locations. Fixed in Black 26.3.1. Do not allow untrusted user input into the value of the `--python-cell-magics` option.

Path Traversal Python Black
NVD GitHub VulDB
CVE-2026-32232
EPSS 0%
PATCH Monitor

Workspace boundary enforcement currently has three related bypass risks. This issue tracks fixing all three in one pull request. - What happens: Path validation can miss dangling symlink components during traversal checks. - Why it matters: A symlink that is unresolved at validation time can later resolve to an external location. - Impact: Read and write operations may escape workspace boundaries. - Affected area: src/security/path.rs (check_symlink_escape). - What happens: The path is validated first, then used later for filesystem operations. - Why it matters: A concurrent filesystem change can swap path components after validation but before open/write. - Impact: Race-based workspace escape is possible. - Affected area: Filesystem and file-consuming tools that call validate_path_in_workspace before I/O. - What happens: A file inside workspace can be a hardlink to an inode outside the intended workspace trust boundary. - Why it matters: Prefix and symlink checks can pass while data access still mutates or reads external content. - Impact: Policy bypass for read/write operations. - Affected area: Any tool that reads or writes via validated paths. | ID | Risk | Severity | Likelihood | Impact | |---|---|---|---|---| | R1 | Dangling symlink component bypass | High | Medium | Workspace boundary escape for read/write | | R2 | Validate/use TOCTOU race | High | Medium | Race-based boundary escape during file I/O | | R3 | Hardlink alias bypass | Medium | Low-Medium | External inode read/write through in-workspace path | 1. Create a symlink inside workspace pointing to a missing target. 2. Validate a path traversing that symlink. 3. Create the target directory outside workspace after validation. 4. Perform file operation and observe potential boundary escape if not fail-closed. 1. Validate a candidate in-workspace path. 2. Before open/write, replace an intermediate component with a link to external location. 3. Continue with the file operation. 4. Observe boundary escape if operation trusts only stale validation result. 1. Place a hardlink inside workspace that points to an external inode. 2. Validate the in-workspace hardlink path. 3. Read or write through this path. 4. Observe external inode access through a path that appears in-scope. Unauthorized cross path boundary [@zpbrent](https://github.com/zpbrent) [f50c17e11ae3e2d40c96730abac41974ef2ee2a8](https://github.com/qhkm/zeptoclaw/commit/f50c17e11ae3e2d40c96730abac41974ef2ee2a8)

Path Traversal Race Condition
NVD GitHub
CVE-2026-32140
EPSS 0% CVSS 8.8
HIGH This Week

Remote code execution in Dataease prior to version 2.10.20 allows authenticated attackers to execute arbitrary code by manipulating the IniFile parameter to load malicious JDBC configuration files through the Redshift driver. An attacker with valid credentials can exploit the aggressive configuration file discovery mechanism to inject dangerous JDBC properties and gain complete system compromise. No patch is currently available, leaving affected deployments vulnerable to this high-severity attack vector.

RCE Path Traversal Dataease
NVD GitHub VulDB
CVE-2026-32116
EPSS 0% CVSS 8.1
HIGH PATCH This Week

Magic Wormhole versions 0.21.0 through 0.22.x allow malicious senders to overwrite arbitrary files on a receiver's system during file transfer operations, potentially compromising SSH keys and shell configuration files. This path traversal vulnerability (CWE-22) requires the attacker to control the sending side of the transfer and affects any user receiving files from an untrusted source. No patch is currently available for this HIGH severity vulnerability.

Path Traversal Magic Wormhole
NVD GitHub VulDB
CVE-2026-28793
EPSS 0% CVSS 8.4
HIGH POC PATCH This Week

High severity vulnerability in TinaCMS. The TinaCMS CLI development server exposes media endpoints that are vulnerable to path traversal, allowing attackers to read and write arbitrary files on the filesystem outside the intended media directory.

Path Traversal
NVD GitHub VulDB
CVE-2026-28792
EPSS 0% CVSS 9.6
CRITICAL POC PATCH Act Now

TinaCMS CLI dev server combines a permissive CORS policy (Access-Control-Allow-Origin: *) with path traversal to enable drive-by attacks. A remote attacker can enumerate, write, and delete files on a developer's machine simply by having them visit a malicious webpage. PoC available.

Path Traversal
NVD GitHub VulDB
CVE-2026-28791
EPSS 0% CVSS 7.4
HIGH PATCH This Week

High severity vulnerability in TinaCMS. ## Affected Package

Path Traversal
NVD GitHub VulDB
CVE-2026-24125
EPSS 0% CVSS 6.3
MEDIUM PATCH This Month

Medium severity vulnerability in TinaCMS. ### Description

Path Traversal
NVD GitHub VulDB
CVE-2026-4044
EPSS 0% CVSS 3.8
LOW Monitor

A vulnerability was detected in projectsend up to r1945. This affects the function realpath of the file /import-orphans.php of the component Delete Handler. [CVSS 3.8 LOW]

PHP Path Traversal
NVD VulDB
CVE-2026-3954
EPSS 0% CVSS 6.5
MEDIUM This Month

OpenBMB XAgent 1.0.0 contains a path traversal vulnerability in the workspace router that allows unauthenticated remote attackers to manipulate the file_name parameter and access or modify arbitrary files on the system. Public exploit code is available for this vulnerability, which affects the integrity and availability of the application. The vendor has not yet released a patch despite early notification of the issue.

Path Traversal AI / ML
NVD GitHub VulDB
CVE-2019-25480
EPSS 0% CVSS 7.5
HIGH POC This Week

ARMBot contains an unrestricted file upload vulnerability in upload.php that allows unauthenticated attackers to upload arbitrary files by manipulating the file parameter with path traversal sequences. [CVSS 7.5 HIGH]

PHP RCE Path Traversal
NVD Exploit-DB VulDB
CVE-2019-25465
EPSS 0% CVSS 7.5
HIGH POC This Week

Hisilicon HiIpcam V100R003 contains a directory traversal vulnerability that allows unauthenticated attackers to access sensitive configuration files by exploiting directory listing in the cgi-bin directory. [CVSS 7.5 HIGH]

Dns Path Traversal
NVD Exploit-DB VulDB
CVE-2026-20162
EPSS 0% CVSS 6.3
MEDIUM This Month

Stored XSS via path traversal in Splunk Enterprise and Cloud Platform allows low-privileged users to inject malicious JavaScript into Views, compromising any user who visits the affected page. An attacker must socially engineer a victim into initiating the malicious request, but no special privileges or user interaction beyond initial page load is required. Affected versions include Splunk Enterprise below 10.2.0, 10.0.3, 9.4.9, and 9.3.9, with no patch currently available.

XSS Path Traversal
NVD VulDB
CVE-2026-30234
EPSS 0% CVSS 6.5
MEDIUM This Month

OpenProject versions prior to 17.2.0 allow authenticated users with BCF import permissions to read arbitrary files from the server through path traversal in crafted .bcf archive uploads. An attacker can manipulate the Snapshot field in markup.bcf to reference absolute or traversal paths (such as /etc/passwd), enabling unauthorized file disclosure within the application's read permissions. This vulnerability requires valid project member credentials and no patch is currently available.

Path Traversal Openproject
NVD GitHub VulDB
CVE-2026-27897
EPSS 0% CVSS 10.0
CRITICAL Act Now

Path traversal in Vociferous speech-to-text tool before 4.4.2. CVSS 10.0.

Path Traversal
NVD GitHub VulDB
CVE-2026-3013
EPSS 0%
Monitor

Coppermine Photo Gallery in versions 1.6.09 through 1.6.27 is vulnerable to path traversal.

Path Traversal
NVD GitHub VulDB
CVE-2026-32061
EPSS 0% CVSS 4.4
MEDIUM PATCH This Month

OpenClaw versions before 2026.2.17 allow privileged users with config modification access to read arbitrary files on the system through path traversal in the $include directive. An attacker in this position can exploit absolute paths, directory traversal sequences, or symlinks to access sensitive data like API keys and credentials that the OpenClaw process can read. No patch is currently available for this medium-severity vulnerability.

Path Traversal Openclaw
NVD GitHub VulDB
CVE-2026-32060
EPSS 0% CVSS 8.8
HIGH PATCH This Week

OpenClaw versions before 2026.2.14 allow authenticated attackers to bypass filesystem restrictions in the apply_patch function through path traversal, enabling arbitrary file write and deletion operations outside the intended workspace. The vulnerability requires an authenticated user but no additional user interaction, and affects systems with apply_patch enabled without sandbox containment. No patch is currently available.

Path Traversal Openclaw
NVD GitHub VulDB
CVE-2026-21360
EPSS 0% CVSS 6.8
MEDIUM This Month

Adobe Commerce and Magento versions 2.4.9-alpha3 through 2.4.4-p16 contain a path traversal vulnerability that allows high-privileged attackers to bypass security controls and access files outside intended directories. The vulnerability requires administrative credentials but no user interaction for exploitation, potentially exposing sensitive data. No patch is currently available for affected versions.

Adobe Path Traversal Commerce B2b +2
NVD
CVE-2026-31817
EPSS 0% CVSS 8.5
HIGH POC PATCH This Week

Arbitrary file write in OliveTin prior to 3000.11.2 allows authenticated attackers to write files to arbitrary filesystem locations via path traversal in the UniqueTrackingId parameter when the saveLogs feature is enabled. The vulnerability enables denial of service and potential system compromise through log file manipulation. Public exploit code exists and no patch is currently available.

Path Traversal Olivetin
NVD GitHub VulDB
CVE-2026-28807
EPSS 0% CVSS 8.7
HIGH This Week

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in gleam-wisp wisp allows arbitrary file read via percent-encoded path traversal. The wisp.serve_static function is vulnerable to path traversal because sanitization runs before percent-decoding.

Path Traversal
NVD GitHub VulDB
CVE-2026-30952
EPSS 0% CVSS 7.5
HIGH PATCH This Week

liquidjs is a Shopify / GitHub Pages compatible template engine in pure JavaScript. versions up to 10.25.0 is affected by path traversal.

Path Traversal Liquidjs
NVD GitHub VulDB
CVE-2026-27825
EPSS 0% CVSS 9.0
CRITICAL PATCH Act Now

MCP Atlassian server has a path traversal vulnerability enabling unauthorized access to Confluence and Jira data outside the intended scope.

Atlassian Path Traversal RCE
NVD GitHub VulDB
CVE-2026-30973
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

Appium's ZIP extraction function in @appium/support versions prior to 7.0.6 fails to properly enforce path traversal protections, allowing attackers to extract malicious ZIP files that write arbitrary files outside the intended directory. The vulnerability stems from an Error object that is created but never thrown, enabling Zip Slip attacks across all JavaScript-based extraction operations. An attacker can exploit this by crafting a malicious ZIP archive to overwrite sensitive files on systems using affected versions.

Path Traversal
NVD GitHub VulDB
CVE-2026-30958
EPSS 0% CVSS 7.2
HIGH POC This Week

Unauthenticated path traversal in OneUptime versions before 10.0.21 allows remote attackers to read arbitrary files from the server via the /workflow/docs/:componentName endpoint, which fails to sanitize user input before passing it to file operations. Public exploit code exists for this vulnerability, affecting all users of vulnerable versions without authentication requirements. Upgrade to version 10.0.21 or later to remediate.

Path Traversal Oneuptime
NVD GitHub VulDB
CVE-2026-30942
EPSS 0% CVSS 6.5
MEDIUM This Month

Flare versions before 1.7.3 contain a path traversal vulnerability in the avatar endpoint that allows authenticated users to read arbitrary files from the application container by exploiting unsanitized filename parameters. Any user with login access, including self-registered accounts on instances with open registration enabled (default configuration), can enumerate and retrieve sensitive files accessible to the Node.js process. The vulnerability requires authentication but poses a significant confidentiality risk on publicly accessible Flare instances without registration restrictions.

Path Traversal Flare
NVD GitHub VulDB
CVE-2026-2741
EPSS 0%
PATCH Monitor

Specially crafted ZIP archives can escape the intended extraction directory during Node.js download and extraction in Vaadin 14.2.0 versions up to 14.14.0 is affected by path traversal.

Node.js Dns Path Traversal
NVD GitHub VulDB
CVE-2026-23907
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

Apache PDFBox versions 2.0.24-2.0.35 and 3.0.0-3.0.6 contain a path traversal vulnerability in the ExtractEmbeddedFiles example that allows attackers to write files outside the intended extraction directory by manipulating embedded file names. Organizations that have integrated this example code into production systems are at risk of unauthorized file writes on the host system. No patch is currently available, requiring developers to manually implement path validation to ensure extracted files remain within the designated directory.

Apache Path Traversal Pdfbox +2
NVD GitHub VulDB
CVE-2025-54659
EPSS 0% CVSS 5.8
MEDIUM This Month

An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability [CWE-22] vulnerability in Fortinet FortiSOAR Agent Communication Bridge 1.1.0, FortiSOAR Agent Communication Bridge 1.0 all versions may allow an unauthenticated attacker to read files accessible to the fortisoar user on a system where the agent is deployed, via sending a crafted request to the agent port. [CVSS 5.8 MEDIUM]

Fortinet Path Traversal
NVD VulDB
CVE-2026-3585
EPSS 0% CVSS 7.5
HIGH This Week

The Events Calendar (WordPress plugin) versions up to 6.15.17 is affected by path traversal (CVSS 7.5).

WordPress Path Traversal
NVD
CVE-2026-30869
EPSS 0% CVSS 9.3
CRITICAL PATCH Act Now

SiYuan prior to 3.5.10 has a path traversal vulnerability enabling arbitrary file access through crafted API requests.

RCE Path Traversal Siyuan
NVD GitHub VulDB
CVE-2026-31802
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

node-tar is a full-featured Tar for Node.js.

Node.js Path Traversal Tar
NVD GitHub VulDB
CVE-2026-28689
EPSS 0% CVSS 6.3
MEDIUM PATCH This Month

Imagemagick versions up to 7.1.2-16 is affected by improper link resolution before file access (CVSS 6.3).

Path Traversal Imagemagick Redhat +1
NVD GitHub
CVE-2026-1776
EPSS 0%
Monitor

Camaleon CMS versions 2.4.5.0 through 2.9.0, prior to commit f54a77e, contain a path traversal vulnerability in the AWS S3 uploader implementation that allows authenticated users to read arbitrary files from the web server’s filesystem.

Aws Path Traversal
NVD GitHub
CVE-2026-30240
EPSS 0% CVSS 9.6
CRITICAL Act Now

Path traversal in Budibase low-code platform 3.31.5 and earlier allows attackers to read arbitrary files through the application builder.

Path Traversal Budibase
NVD GitHub VulDB
CVE-2025-70028
EPSS 0% CVSS 7.5
HIGH This Week

An issue pertaining to CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') was discovered in Sunbird-Ed SunbirdEd-portal v1.13.4. [CVSS 7.5 HIGH]

Path Traversal
NVD GitHub
CVE-2026-3089
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

Actual Sync Server allows authenticated users to upload files through POST /sync/upload-user-file. In versions up to 26.3.0 is affected by path traversal.

Path Traversal
NVD GitHub
CVE-2025-41758
EPSS 0% CVSS 8.8
HIGH This Week

A low-privileged remote attacker can exploit an arbitrary file write vulnerability in the wwupload.cgi endpoint. Due to path traversal this can lead to overwriting arbitrary files on the device and achieving a full system compromise. [CVSS 8.8 HIGH]

Path Traversal Universal Bacnet Router Firmware
NVD
CVE-2025-41757
EPSS 0% CVSS 8.8
HIGH This Week

A low-privileged remote attacker can abuse the backup restore functionality of UBR (ubr-restore) which runs with elevated privileges and does not validate the contents of the backup archive to create or overwrite arbitrary files anywhere on the system. [CVSS 8.8 HIGH]

Path Traversal Universal Bacnet Router Firmware
NVD
CVE-2025-41755
EPSS 0% CVSS 6.5
MEDIUM This Month

A low-privileged remote attacker can exploit the ubr-logread method in wwwubr.cgi to read arbitrary files on the system. [CVSS 6.5 MEDIUM]

Path Traversal Information Disclosure Universal Bacnet Router Firmware
NVD
CVE-2026-3795
EPSS 0% CVSS 6.3
MEDIUM POC This Month

DoraCMS 3.0.x contains a path traversal vulnerability in the createFileBypath function that allows authenticated attackers to read, write, or delete arbitrary files on the server. Public exploit code exists for this vulnerability, and no patch is currently available from the vendor.

Path Traversal Doracms
NVD VulDB
CVE-2026-3719
EPSS 0% CVSS 5.3
MEDIUM This Month

Path traversal in Tsinghua Unigroup Electronic Archives System 3.2.210802 allows unauthenticated remote attackers to read arbitrary files via a crafted path parameter in the /System/Cms/downLoad endpoint. Public exploit code exists for this vulnerability, and the vendor has not provided a patch or response to remediation efforts.

Path Traversal
NVD GitHub VulDB
CVE-2026-3695
EPSS 0% CVSS 6.5
MEDIUM POC This Month

SourceCodester Modern Image Gallery App 1.0 contains a path traversal vulnerability in the /delete.php file that allows unauthenticated remote attackers to manipulate the filename parameter and access or delete arbitrary files. Public exploit code exists for this vulnerability, and no patch is currently available. The vulnerability can lead to information disclosure or file deletion on affected systems.

PHP Path Traversal Modern Image Gallery App
NVD GitHub VulDB
CVE-2026-30848
EPSS 0% CVSS 3.7
LOW PATCH Monitor

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. [CVSS 3.7 LOW]

Node.js Path Traversal
NVD GitHub
CVE-2026-29780
EPSS 0% CVSS 5.5
MEDIUM POC PATCH This Month

Unsanitized attachment filenames in eml_parser prior to version 2.0.1 enable path traversal attacks, allowing attackers to write files outside the intended output directory when the example extraction script processes malicious emails. Organizations using the vulnerable example code or similar attachment handling logic are at risk of unauthorized file writes that could overwrite critical files or introduce malicious content. Public exploit code exists for this vulnerability, and a patch is available in version 2.0.1 and later.

Python Path Traversal Eml Parser
NVD GitHub
CVE-2026-29190
EPSS 0% CVSS 4.1
MEDIUM This Month

Karapace versions before 6.0.0 contain a path traversal vulnerability in the backup restoration functionality that allows attackers to read arbitrary files from the system by crafting malicious backup files. Organizations using Karapace's backup/restore feature with untrusted backup sources are at risk, with the actual impact limited by the file permissions of the Karapace process. No patch is currently available, requiring users to restrict backup sources or disable the backup functionality until version 6.0.0 is released.

Path Traversal Karapace
NVD GitHub
CVE-2026-29185
EPSS 0% CVSS 2.7
LOW PATCH Monitor

Backstage is an open framework for building developer portals. Prior to version 1.20.1, a vulnerability in the SCM URL parsing used by Backstage integrations allowed path traversal sequences in encoded form to be included in file paths. When these URLs were processed by integration functions that construct API URLs, the traversal segments could redirect requests to unintended SCM provider API e...

Path Traversal
NVD GitHub
CVE-2026-30828
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

Path traversal in Wallos subscription tracker versions prior to 4.6.2 allows unauthenticated remote attackers to read arbitrary files from the hosting system via a malicious url parameter. Public exploit code exists for this vulnerability, which has a high severity CVSS score of 7.5. The vulnerability is patched in version 4.6.2 and later.

Path Traversal Wallos
NVD GitHub
CVE-2026-29790
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

Path traversal in dbt-common's tarball extraction function allows attackers to write files outside the intended destination directory by exploiting improper path validation in the safe_extract() method. An attacker can craft a malicious tarball to place files in sibling directories, potentially compromising systems using affected versions of dbt-common in dbt-core and adapter implementations. No patch is currently available for this vulnerability.

Path Traversal Dbt Common
NVD GitHub VulDB
CVE-2026-29064
EPSS 0% CVSS 8.2
HIGH POC PATCH This Week

Zarf is an Airgap Native Packager Manager for Kubernetes. [CVSS 8.2 HIGH]

Kubernetes Path Traversal Zarf
NVD GitHub
CVE-2026-2753
EPSS 0% CVSS 7.5
HIGH This Week

Navtor NavBox exposes an unauthenticated path traversal vulnerability in its HTTP service that allows remote attackers to read arbitrary files from the server by submitting requests with absolute filesystem paths. Successful exploitation enables unauthorized disclosure of sensitive configuration files and system information, limited only by the service process privileges. No patch is currently available.

Path Traversal
NVD
CVE-2018-25184
EPSS 0% CVSS 6.2
MEDIUM POC This Month

Surreal ToDo 0.6.1.2 contains a local file inclusion vulnerability that allows unauthenticated attackers to read arbitrary files by manipulating the content parameter. [CVSS 6.2 MEDIUM]

PHP Lfi Path Traversal
NVD Exploit-DB
CVE-2018-25181
EPSS 1% CVSS 7.5
HIGH POC This Week

Musicco 2.0.0 contains a path traversal vulnerability that allows unauthenticated attackers to download arbitrary directories by manipulating the parent parameter. [CVSS 7.5 HIGH]

Path Traversal
NVD Exploit-DB
CVE-2018-25164
EPSS 0% CVSS 7.5
HIGH POC This Week

EverSync 0.5 contains an arbitrary file download vulnerability that allows unauthenticated attackers to access sensitive files by requesting them directly from the files directory. [CVSS 7.5 HIGH]

Path Traversal Information Disclosure
NVD Exploit-DB
CVE-2026-2331
EPSS 0% CVSS 9.8
CRITICAL Act Now

Unauthenticated file read/write via AppEngine Fileaccess over HTTP.

Path Traversal Information Disclosure
NVD
CVE-2026-2330
EPSS 0% CVSS 9.4
CRITICAL Act Now

Filesystem access via CROWN REST interface on industrial device. EPSS 0.25%.

Path Traversal Information Disclosure
NVD
CVE-2026-29059
EPSS 0% CVSS 6.9
MEDIUM This Month

Windmill is an open-source developer platform for internal code: APIs, background jobs, workflows and UIs. Prior to version 1.603.3, an unauthenticated path traversal vulnerability exists in Windmill's get_log_file endpoint "(/api/w/{workspace}/jobs_u/get_log_file/{filename})".

Path Traversal
NVD GitHub
CVE-2026-29065
EPSS 0% CVSS 9.1
CRITICAL POC PATCH Act Now

Zip Slip in changedetection.io before 0.54.4 via backup restore. PoC and patch available.

Path Traversal Changedetection
NVD GitHub
CVE-2026-28800
EPSS 0% CVSS 6.4
MEDIUM This Month

Natro Macro versions prior to 1.1.0 allow any user with message permissions in a Discord channel where Remote Control is enabled to execute arbitrary commands on affected systems, including keyboard and mouse control and unrestricted file access. The vulnerability stems from improper access controls on the remote control feature when configured in non-private channels. No patch is currently available for affected versions.

Path Traversal Natro Macro
NVD GitHub
CVE-2026-28795
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Path traversal in OpenChatBI before fix. PoC and patch available.

Path Traversal AI / ML Openchatbi
NVD GitHub
CVE-2026-28679
EPSS 0% CVSS 8.6
HIGH POC This Week

Home-Gallery.org is a self-hosted open-source web gallery to browse personal photos and videos. [CVSS 8.6 HIGH]

Path Traversal Homegallery
NVD GitHub
CVE-2026-28676
EPSS 0% CVSS 8.8
HIGH This Week

OpenShift versions prior to 1.6.3-alpha contain a path traversal vulnerability in multiple storage helpers that fail to properly validate directory boundaries, allowing authenticated attackers to read, write, or delete arbitrary files on the system. An attacker with valid credentials can exploit insufficient path sanitization to escape the intended base directory and access sensitive data or modify system files. No patch is currently available for affected versions.

Path Traversal Opensift
NVD GitHub VulDB
CVE-2026-28507
EPSS 0% CVSS 7.2
HIGH PATCH This Week

Unauthenticated attackers can achieve remote code execution in Idno social publishing platform versions before 1.6.4 by exploiting a chain of import file write and template path traversal vulnerabilities. An attacker with high privileges can leverage command injection to execute arbitrary code on affected systems. A patch is available in version 1.6.4 and should be applied immediately as this vulnerability carries a 7.2 CVSS score.

RCE Path Traversal Command Injection +1
NVD GitHub VulDB
CVE-2026-28429
EPSS 0% CVSS 7.5
HIGH This Week

ParseGamestate.php in Talishar allows unauthenticated remote attackers to read arbitrary files through path traversal in the gameName parameter when the script is accessed directly, bypassing input validation present in primary application entry points. An attacker can exploit this vulnerability to access sensitive files on the affected server without authentication or user interaction. No patch is currently available for this vulnerability.

PHP Path Traversal
NVD GitHub
CVE-2026-28486
EPSS 0% CVSS 6.1
MEDIUM PATCH This Month

OpenClaw versions 2026.1.16 through 2026.2.13 allow local attackers to write arbitrary files outside intended directories by supplying malicious archives to the skills, hooks, plugins, or signal installation commands. Successful exploitation enables attackers to achieve code execution or establish persistence on affected systems. A patch is available for affected users.

Path Traversal Openclaw
NVD GitHub
CVE-2026-28482
EPSS 0% CVSS 7.1
HIGH PATCH This Week

OpenClaw versions before 2026.2.12 suffer from a path traversal vulnerability in transcript file handling that allows authenticated local users to read and modify arbitrary files on the system by injecting directory traversal sequences into sessionId or sessionFile parameters. An attacker with local access can exploit this to access sensitive files outside the intended agent sessions directory without additional privileges. No patch is currently available for this vulnerability.

Path Traversal
NVD GitHub
CVE-2026-28462
EPSS 0% CVSS 7.5
HIGH PATCH This Week

OpenClaw versions before 2026.2.13 suffer from a path traversal vulnerability in the browser control API that allows authenticated attackers to write arbitrary files outside designated temporary directories via the trace and download endpoints. An attacker with API access can exploit this to place malicious files in unintended locations on the system. A patch is available to address this high-severity flaw.

Path Traversal Openclaw
NVD GitHub
CVE-2026-28457
EPSS 0% CVSS 6.1
MEDIUM PATCH This Month

OpenClaw versions before 2026.2.14 allow local attackers to write arbitrary files outside the sandbox directory through path traversal sequences in crafted skill package names when sandbox skill mirroring is enabled. An attacker can exploit this by providing a malicious skill package with traversal patterns like ../ or absolute paths in the frontmatter name parameter, potentially compromising system integrity. A patch is available to remediate this vulnerability.

Path Traversal Openclaw
NVD GitHub
CVE-2026-28453
EPSS 0% CVSS 7.5
HIGH PATCH This Week

OpenClaw before version 2026.2.14 fails to properly validate file paths when extracting TAR archives, enabling attackers to use path traversal sequences to write files outside the intended extraction directory. An unauthenticated remote attacker can exploit this to overwrite configuration files or inject malicious code into the system. A patch is available for affected versions.

Path Traversal Openclaw
NVD GitHub
CVE-2026-28447
EPSS 0% CVSS 8.1
HIGH PATCH This Week

OpenClaw 2026.1.29-beta.1 through 2026.2.0 is vulnerable to path traversal during plugin installation, enabling attackers to write arbitrary files outside the intended extensions directory by crafting malicious package names with traversal sequences. An unauthenticated attacker can exploit this when users execute the plugin install command, potentially achieving arbitrary file write capabilities on the affected system. A patch is available in version 2026.2.1.

Path Traversal Openclaw
NVD GitHub
CVE-2026-28393
EPSS 0% CVSS 7.7
HIGH PATCH This Week

Arbitrary JavaScript execution in OpenClaw versions prior to 2026.2.14 results from improper path validation in the hook transform module loader, allowing attackers with configuration write access to load malicious modules with gateway process privileges. The vulnerability affects the hooks.mappings[].transform.module parameter, which fails to restrict absolute paths and directory traversal sequences. A patch is available.

Path Traversal Openclaw
NVD GitHub
CVE-2024-43035
EPSS 0% CVSS 5.8
MEDIUM PATCH This Month

Fonoster 0.5.5 before 0.6.1 allows ../ directory traversal to read arbitrary files via the /sounds/:file or /tts/:file VoiceServer endpoint. This occurs in serveFiles in mods/voice/src/utils.ts. [CVSS 5.8 MEDIUM]

Path Traversal
NVD GitHub
CVE-2025-70231
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

Path traversal in D-Link DIR-513 verification code processing. PoC available.

D-Link Path Traversal Dir 513 Firmware
NVD GitHub
CVE-2025-45691
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

An Arbitrary File Read vulnerability exists in the ImageTextPromptValue class in Exploding Gradients RAGAS v0.2.3 to v0.2.14. The vulnerability stems from improper validation and sanitization of URLs supplied in the retrieved_contexts parameter when handling multimodal inputs. [CVSS 7.5 HIGH]

Path Traversal AI / ML Ragas +1
NVD GitHub
CVE-2026-28538
EPSS 0% CVSS 5.9
MEDIUM This Month

Path traversal vulnerability in the certificate management module. Impact: Successful exploitation of this vulnerability may affect availability. [CVSS 5.9 MEDIUM]

Path Traversal Harmonyos
NVD
CVE-2026-2743
EPSS 1% CVSS 9.8
CRITICAL Act Now

Path traversal to RCE in SeppMail web interface via large file transfer. EPSS 0.52%.

RCE Path Traversal Seppmail
NVD
CVE-2026-28078
EPSS 0% CVSS 4.9
MEDIUM This Month

Stylemix uListing versions 2.2.0 and earlier contain a path traversal vulnerability that allows authenticated users with high privileges to access files outside the intended directory structure and read sensitive information. The vulnerability requires valid credentials and does not enable file modification or system disruption, limiting its impact to unauthorized information disclosure.

Path Traversal
NVD
CVE-2026-22460
EPSS 0% CVSS 8.6
HIGH This Week

Path traversal in wpWax FormGent plugin versions up to 1.4.2 enables unauthenticated remote attackers to access files outside intended directories. The vulnerability requires no user interaction and can be exploited over the network to cause denial of service or potentially disclose sensitive information. No patch is currently available for this high-severity issue.

Path Traversal
NVD
CVE-2025-69411
EPSS 0% CVSS 7.5
HIGH This Week

Robert Seyfriedsberger ionCube tester plus ioncube-tester-plus is affected by path traversal (CVSS 7.5).

Path Traversal
NVD
CVE-2026-28427
EPSS 0%
Monitor

OpenDeck is Linux software for your Elgato Stream Deck. versions up to 2.8.1 is affected by path traversal.

Linux Path Traversal
NVD GitHub
CVE-2026-0847
EPSS 0% CVSS 8.6
HIGH PATCH This Week

Unauthorized file access in NLTK through path traversal flaws in multiple CorpusReader classes (versions up to 3.9.2) allows unauthenticated attackers to read arbitrary files on affected systems, potentially exposing SSH keys, API tokens, and other sensitive data. The vulnerability affects NLP applications and machine learning APIs that process user-controlled file inputs without proper validation. No patch is currently available.

Ssh RCE Path Traversal +3
NVD
CVE-2026-27442
EPSS 0% CVSS 7.5
HIGH This Week

Improper filename validation in SEPPmail Secure Email Gateway's GINA web interface (versions before 15.0.1) enables unauthenticated remote attackers to access arbitrary files on the gateway through specially crafted encrypted email attachments. This path traversal vulnerability affects the confidentiality of sensitive data stored on affected systems. No patch is currently available.

Path Traversal Seppmail
NVD
Prev Page 4 of 20 Next

Quick Facts

Typical Severity
HIGH
Category
web
Total CVEs
1798

Related CWEs

MITRE ATT&CK

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy