Path Traversal
Path Traversal vulnerabilities allow attackers to access files and directories outside the intended directory structure, potentially exposing sensitive system files.
34
MEDIUM
Data Exposure
Understanding Path Traversal
Detailed information about this vulnerability type.
How to Identify
- •Review security advisories
- •Perform regular security testing
Prevention Best Practices
- ✓Follow security best practices
- ✓Keep systems updated
Path Traversal CVEs (34)
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2026-23942 | 5.3 | This vulnerability allows an attacker with valid credentials to access files and directories outside their intended area on an SFTP server, potentially exposing sensitive data. It occurs because the server incorrectly checks if a requested path is within the allowed directory, allowing access to sibling directories that share similar names. | Unknown | Exploit Available | 25 days agoMar 13, 2026 |
| CVE-2025-66249 | 6.3 | This vulnerability allows an attacker to access files outside of the intended directory on an Apache Livy server, potentially exposing sensitive data. It can only be exploited if the server is configured with a non-default setting for local directory access, so users should upgrade to version 0.9.0 to protect against this risk. | apachelivy | Exploit Available | 25 days agoMar 13, 2026 |
| CVE-2026-3013 | 8.7 | An attacker can exploit a flaw in certain versions of Coppermine Photo Gallery to read any file on the server, potentially exposing sensitive information. This can be done without needing to log in, making it a serious risk for any site using the affected versions. | Unknown | Exploit Available | 27 days agoMar 11, 2026 |
| CVE-2026-32061 | 6.7 | This vulnerability allows an attacker to read sensitive files on the server, such as API keys and credentials, by manipulating file paths in the OpenClaw application. To exploit this, the attacker must have the ability to modify configuration settings within OpenClaw. | openclawopenclaw | Theoretical | 27 days agoMar 11, 2026 |
| CVE-2026-32060 | 8.7 | This vulnerability allows attackers to write or delete files on the server outside of the designated workspace, which can lead to unauthorized changes or data loss. It occurs when the apply_patch feature is enabled without proper security measures in place, allowing attackers to manipulate file paths to escape the intended directory. | openclawopenclaw | Exploit Available | 27 days agoMar 11, 2026 |
| CVE-2026-1776 | 6.0 | This vulnerability allows authenticated users, even those with low privileges, to access and read sensitive files from the web server, such as system configuration files. It occurs in a specific file upload feature when the system is set up to use AWS S3 for storage, and it fails to properly check file paths, making it easy for attackers to exploit. | Unknown | Exploit Available | 28 days agoMar 10, 2026 |
| CVE-2025-41758 | 8.8 | This vulnerability allows a remote attacker with low privileges to overwrite any file on the device, potentially taking full control of the system. It exploits a flaw in the wwupload.cgi endpoint, which means the attacker can manipulate file paths to access and change critical files. | mbs-solutionsuniversal bacnet router firmware | Theoretical | 29 days agoMar 9, 2026 |
| CVE-2026-3719 | 5.5 | An attacker can exploit this vulnerability to access files on the server that they shouldn't be able to reach, potentially exposing sensitive data. This can be done remotely by manipulating a specific file path in the system, and there are already tools available that demonstrate how to carry out the attack. | Unknown | Exploit Available | about 1 month agoMar 8, 2026 |
| CVE-2026-29780 | 5.5 | This vulnerability allows an attacker to write files to any location on the server by exploiting a flaw in how the eml_parser handles attachment filenames, potentially leading to unauthorized access or data loss. It occurs when the script processes emails with specially crafted attachment names, and it has been fixed in version 2.0.1. | govcert.lueml parser | Exploit Available | about 1 month agoMar 7, 2026 |
| CVE-2026-29190 | 5.3 | This vulnerability allows an attacker to read any file on the system running Karapace by providing a specially crafted backup file. It mainly affects setups that use the backup feature and process files from untrusted sources, with the actual risk depending on the permissions of the Karapace application. | aivenkarapace | Theoretical | about 1 month agoMar 7, 2026 |
| CVE-2026-29185 | 2.7 | This vulnerability allows an attacker to manipulate file paths in a way that could redirect requests to unauthorized API endpoints, potentially exposing sensitive information if they have access to the server-side integration credentials. It requires the attacker to craft specific URLs that exploit the way Backstage processes these paths before version 1.20.1. | Unknown | Theoretical | about 1 month agoMar 7, 2026 |
| CVE-2018-25181 | 8.7 | This vulnerability allows attackers to download sensitive files from a system by tricking the application into revealing directories it shouldn't. The attacker doesn't need to be logged in or authenticated; they just need to manipulate a specific part of the request to access these files. | Unknown | Exploit Available | about 1 month agoMar 6, 2026 |
| CVE-2026-29059 | 6.9 | An attacker can exploit a flaw in Windmill to read any file on the server by manipulating the filename in a specific API request, as long as they know the file's path. This vulnerability affects versions before 1.603.3 and has been fixed in the latest update. | Unknown | Exploit Available | about 1 month agoMar 6, 2026 |
| CVE-2026-29065 | 8.8 | This vulnerability allows an attacker to overwrite files on the server by uploading a specially crafted ZIP file, which can lead to unauthorized changes or access to sensitive data. It affects versions prior to 0.54.4 of the changedetection tool, so users should upgrade to the latest version to protect against this risk. | webtechnologieschangedetection | Theoretical | about 1 month agoMar 6, 2026 |
| CVE-2026-28795 | 8.7 | This vulnerability allows an attacker to manipulate the file_format parameter in the OpenChatBI tool, potentially letting them access or overwrite files on the server that they shouldn't be able to reach. It requires the attacker to have access to the tool and to exploit the flaw before the software is updated to version 0.2.2, which fixes the issue. | zhongyu09openchatbi | Exploit Available | about 1 month agoMar 6, 2026 |
| CVE-2026-28538 | 5.5 | This vulnerability allows an attacker to manipulate file paths in the certificate management system, potentially leading to service disruptions. To exploit this, the attacker would need access to the system where HarmonyOS is running. | huaweiharmonyos | Exploit Available | about 1 month agoMar 5, 2026 |
| CVE-2026-2743 | 10.0 | This vulnerability allows an attacker to upload malicious files to a server, potentially leading to remote control of the system. It affects the large file transfer feature in SeppMail versions 15.0.2.1 and earlier, and requires the attacker to have access to the user web interface. | seppmailseppmail | Exploit Available | about 1 month agoMar 5, 2026 |
| CVE-2026-28769 | 5.3 | An attacker with valid login credentials can exploit a flaw in the web management portal of the SFX Series satellite receiver to access and list files on the device's filesystem by manipulating a specific parameter. This could lead to sensitive information exposure if the attacker knows how to navigate the directory structure. | datacastsfx2100 firmware | Theoretical | about 1 month agoMar 4, 2026 |
| CVE-2026-28518 | 8.4 | This vulnerability allows attackers to overwrite or create files on the server by tricking the system into importing malicious ZIP files that contain special path sequences. It affects OpenViking versions 0.2.1 and earlier, and requires the attacker to have access to upload these specially crafted ZIP archives. | Unknown | Exploit Available | about 1 month agoMar 3, 2026 |
| CVE-2026-3405 | 2.3 | This vulnerability allows an attacker to access files on the server that they shouldn't be able to reach, potentially exposing sensitive information. However, exploiting this flaw is difficult and requires a specific setup, making it less likely for most attackers to succeed. | jeesitejeesite | Exploit Available | about 1 month agoMar 2, 2026 |