Path Traversal

Path Traversal vulnerabilities allow attackers to access files and directories outside the intended directory structure, potentially exposing sensitive system files.

Total CVEs

34

Typical Severity

MEDIUM

Category

Data Exposure

Understanding Path Traversal

Detailed information about this vulnerability type.

How to Identify

  • Review security advisories
  • Perform regular security testing

Prevention Best Practices

  • Follow security best practices
  • Keep systems updated

Path Traversal CVEs (34)

DescriptionVendor / ProductExploit Status
CVE-2026-22519.8

This vulnerability allows an attacker to access unauthorized files on the system, potentially leading to remote code execution, which means they could run malicious software on the affected Xerox FreeFlow Core software. It affects versions up to 8.0.7, so upgrading to version 8.1.0 is crucial to protect against this risk.

xeroxfreeflow core
Exploit Available
about 1 month agoFeb 27, 2026
CVE-2026-262282.3

An attacker who is authenticated and has network access to the Remote Access Server can exploit this vulnerability to access files outside the intended download directory on the VLC app for Android. However, their access is limited to the app's internal storage and specific external storage areas due to Android's security restrictions.

Unknown
Theoretical
about 1 month agoFeb 26, 2026
CVE-2026-276999.8

This vulnerability allows an attacker to trick the FTP client into saving files outside of the intended download folder, potentially overwriting important system files. It occurs when the client connects to a malicious FTP server that sends specially crafted directory listings, and it affects versions prior to 5.2.0 of the basic-ftp library.

patrickjuchlibasic-ftp
Theoretical
about 1 month agoFeb 25, 2026
CVE-2026-29535.3

An attacker can exploit a vulnerability in Dromara UJCMS to gain unauthorized access to files on the server by manipulating the deleteDirectory function, potentially allowing them to delete or alter important files. This attack can be carried out remotely, and since the vendor has not responded to the issue, it remains a risk for users of this software.

ujcmsujcms
Exploit Available
about 1 month agoFeb 22, 2026
CVE-2026-28645.3

An attacker can remotely manipulate the picture deletion function in the affected software to access or delete files outside the intended directory, potentially compromising sensitive data. This vulnerability affects specific versions of the software, but since it doesn't use versioning, it's unclear which releases are safe.

Unknown
Exploit Available
about 2 months agoFeb 21, 2026
CVE-2026-216202.3

This vulnerability allows an attacker to access files outside of the intended directory by manipulating file paths, potentially exposing sensitive information. It affects specific versions of the Erlang OTP software, so systems running those versions need to be updated to close this security gap.

Unknown
Exploit Available
about 2 months agoFeb 20, 2026
CVE-2026-24266.5

This vulnerability allows an attacker with Administrator-level access to delete any file on the server, including critical files like the configuration file for WordPress. By exploiting this flaw in the WP-DownloadManager plugin, they could potentially gain control over the website or server.

Unknown
Exploit Available
about 2 months agoFeb 18, 2026
CVE-2026-24192.7

This vulnerability allows authenticated attackers with Administrator-level access to configure the WP-DownloadManager plugin to access and list any files on the server, potentially exposing sensitive information. It occurs due to a flaw in how the plugin checks file paths, which can be exploited if the attacker has the right permissions.

Unknown
Exploit Available
about 2 months agoFeb 18, 2026
CVE-2025-597930.0

This vulnerability allows an attacker with valid login credentials to upload files to any location on the server's filesystem, potentially leading to the execution of malicious code. The issue arises because the application fails to properly check the file paths, making it easy for attackers to manipulate where files are saved.

Unknown
Theoretical
about 2 months agoFeb 17, 2026
CVE-2026-25525.1

This vulnerability allows an attacker to access and potentially delete files on the server by manipulating a specific file path in the ZenTao application. It affects versions up to 21.7.8, so upgrading to version 21.7.9 is necessary to fix the issue.

zentaozentao
Exploit Available
about 2 months agoFeb 16, 2026
CVE-2026-25515.3

This vulnerability allows an attacker to remotely delete files on the ZenTao server by manipulating a specific function in the software. It affects versions up to 21.7.8, and the attack can be executed without needing special access or credentials.

zentaozentao
Exploit Available
about 2 months agoFeb 16, 2026
CVE-2024-341937.5

This vulnerability allows an attacker to read any file on the server by manipulating the file parameter in a specific PHP interface. It occurs in version 3.2.7 of smanga and does not require any special access, making it a significant risk for exposed systems.

lkw199711smanga
Theoretical
almost 2 years agoMay 20, 2024
CVE-2015-101059.8

This vulnerability allows an attacker to remotely access sensitive files on a server by manipulating a specific filename in the IP Blacklist Cloud Plugin for WordPress. To exploit this, the attacker needs to send a specially crafted request to the affected plugin, which could lead to unauthorized access to the server's file system.

ad33lxip blacklist cloud
Exploit Available
almost 3 years agoMay 1, 2023
CVE-2021-417739.8

This vulnerability allows an attacker to access files outside of the intended directories on an Apache HTTP Server, potentially leading to remote code execution if certain scripts are enabled. This can happen if the server is misconfigured and does not properly restrict access to these files.

apachehttp server
Exploit Available
over 4 years agoOct 5, 2021
Showing 21 to 34 of 34 results