Path Traversal

Path Traversal vulnerabilities allow attackers to access files and directories outside the intended directory structure, potentially exposing sensitive system files.

Total CVEs

34

Typical Severity

MEDIUM

Category

Data Exposure

Understanding Path Traversal

Detailed information about this vulnerability type.

How to Identify

  • Review security advisories
  • Perform regular security testing

Prevention Best Practices

  • Follow security best practices
  • Keep systems updated

Path Traversal CVEs (34)

DescriptionVendor / ProductExploit Status
CVE-2026-239425.3

This vulnerability allows an attacker with valid credentials to access files and directories outside their intended area on an SFTP server, potentially exposing sensitive data. It occurs because the server incorrectly checks if a requested path is within the allowed directory, allowing access to sibling directories that share similar names.

Unknown
Exploit Available
25 days agoMar 13, 2026
CVE-2025-662496.3

This vulnerability allows an attacker to access files outside of the intended directory on an Apache Livy server, potentially exposing sensitive data. It can only be exploited if the server is configured with a non-default setting for local directory access, so users should upgrade to version 0.9.0 to protect against this risk.

apachelivy
Exploit Available
25 days agoMar 13, 2026
CVE-2026-30138.7

An attacker can exploit a flaw in certain versions of Coppermine Photo Gallery to read any file on the server, potentially exposing sensitive information. This can be done without needing to log in, making it a serious risk for any site using the affected versions.

Unknown
Exploit Available
27 days agoMar 11, 2026
CVE-2026-320616.7

This vulnerability allows an attacker to read sensitive files on the server, such as API keys and credentials, by manipulating file paths in the OpenClaw application. To exploit this, the attacker must have the ability to modify configuration settings within OpenClaw.

openclawopenclaw
Theoretical
27 days agoMar 11, 2026
CVE-2026-320608.7

This vulnerability allows attackers to write or delete files on the server outside of the designated workspace, which can lead to unauthorized changes or data loss. It occurs when the apply_patch feature is enabled without proper security measures in place, allowing attackers to manipulate file paths to escape the intended directory.

openclawopenclaw
Exploit Available
27 days agoMar 11, 2026
CVE-2026-17766.0

This vulnerability allows authenticated users, even those with low privileges, to access and read sensitive files from the web server, such as system configuration files. It occurs in a specific file upload feature when the system is set up to use AWS S3 for storage, and it fails to properly check file paths, making it easy for attackers to exploit.

Unknown
Exploit Available
28 days agoMar 10, 2026
CVE-2025-417588.8

This vulnerability allows a remote attacker with low privileges to overwrite any file on the device, potentially taking full control of the system. It exploits a flaw in the wwupload.cgi endpoint, which means the attacker can manipulate file paths to access and change critical files.

mbs-solutionsuniversal bacnet router firmware
Theoretical
29 days agoMar 9, 2026
CVE-2026-37195.5

An attacker can exploit this vulnerability to access files on the server that they shouldn't be able to reach, potentially exposing sensitive data. This can be done remotely by manipulating a specific file path in the system, and there are already tools available that demonstrate how to carry out the attack.

Unknown
Exploit Available
about 1 month agoMar 8, 2026
CVE-2026-297805.5

This vulnerability allows an attacker to write files to any location on the server by exploiting a flaw in how the eml_parser handles attachment filenames, potentially leading to unauthorized access or data loss. It occurs when the script processes emails with specially crafted attachment names, and it has been fixed in version 2.0.1.

govcert.lueml parser
Exploit Available
about 1 month agoMar 7, 2026
CVE-2026-291905.3

This vulnerability allows an attacker to read any file on the system running Karapace by providing a specially crafted backup file. It mainly affects setups that use the backup feature and process files from untrusted sources, with the actual risk depending on the permissions of the Karapace application.

aivenkarapace
Theoretical
about 1 month agoMar 7, 2026
CVE-2026-291852.7

This vulnerability allows an attacker to manipulate file paths in a way that could redirect requests to unauthorized API endpoints, potentially exposing sensitive information if they have access to the server-side integration credentials. It requires the attacker to craft specific URLs that exploit the way Backstage processes these paths before version 1.20.1.

Unknown
Theoretical
about 1 month agoMar 7, 2026
CVE-2018-251818.7

This vulnerability allows attackers to download sensitive files from a system by tricking the application into revealing directories it shouldn't. The attacker doesn't need to be logged in or authenticated; they just need to manipulate a specific part of the request to access these files.

Unknown
Exploit Available
about 1 month agoMar 6, 2026
CVE-2026-290596.9

An attacker can exploit a flaw in Windmill to read any file on the server by manipulating the filename in a specific API request, as long as they know the file's path. This vulnerability affects versions before 1.603.3 and has been fixed in the latest update.

Unknown
Exploit Available
about 1 month agoMar 6, 2026
CVE-2026-290658.8

This vulnerability allows an attacker to overwrite files on the server by uploading a specially crafted ZIP file, which can lead to unauthorized changes or access to sensitive data. It affects versions prior to 0.54.4 of the changedetection tool, so users should upgrade to the latest version to protect against this risk.

webtechnologieschangedetection
Theoretical
about 1 month agoMar 6, 2026
CVE-2026-287958.7

This vulnerability allows an attacker to manipulate the file_format parameter in the OpenChatBI tool, potentially letting them access or overwrite files on the server that they shouldn't be able to reach. It requires the attacker to have access to the tool and to exploit the flaw before the software is updated to version 0.2.2, which fixes the issue.

zhongyu09openchatbi
Exploit Available
about 1 month agoMar 6, 2026
CVE-2026-285385.5

This vulnerability allows an attacker to manipulate file paths in the certificate management system, potentially leading to service disruptions. To exploit this, the attacker would need access to the system where HarmonyOS is running.

huaweiharmonyos
Exploit Available
about 1 month agoMar 5, 2026
CVE-2026-274310.0

This vulnerability allows an attacker to upload malicious files to a server, potentially leading to remote control of the system. It affects the large file transfer feature in SeppMail versions 15.0.2.1 and earlier, and requires the attacker to have access to the user web interface.

seppmailseppmail
Exploit Available
about 1 month agoMar 5, 2026
CVE-2026-287695.3

An attacker with valid login credentials can exploit a flaw in the web management portal of the SFX Series satellite receiver to access and list files on the device's filesystem by manipulating a specific parameter. This could lead to sensitive information exposure if the attacker knows how to navigate the directory structure.

datacastsfx2100 firmware
Theoretical
about 1 month agoMar 4, 2026
CVE-2026-285188.4

This vulnerability allows attackers to overwrite or create files on the server by tricking the system into importing malicious ZIP files that contain special path sequences. It affects OpenViking versions 0.2.1 and earlier, and requires the attacker to have access to upload these specially crafted ZIP archives.

Unknown
Exploit Available
about 1 month agoMar 3, 2026
CVE-2026-34052.3

This vulnerability allows an attacker to access files on the server that they shouldn't be able to reach, potentially exposing sensitive information. However, exploiting this flaw is difficult and requires a specific setup, making it less likely for most attackers to succeed.

jeesitejeesite
Exploit Available
about 1 month agoMar 2, 2026
Showing 1 to 20 of 34 results