WhisperX tag archive

#CWE-22

This page collects WhisperX intelligence signals tagged #CWE-22. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (10)

The Lab · 2026-04-11 16:22:34 · GitHub Issues

1. DV0x Creative Ad Agent Server Exposes Path Traversal Vulnerability, Allows Arbitrary File Read

A critical path traversal vulnerability in the `creative-ad-agent-server` allows unauthenticated attackers to read arbitrary files from the host system. The flaw, discovered by independent researcher BruceJin, resides in the `/api/generated-image` endpoint, where user-supplied input is improperly sanitized before being...

The Lab · 2026-04-16 02:22:28 · GitHub Issues

2. Apache Superset Code Audit Flags Medium-Severity Path Traversal Risk in URL Handling

A static application security testing (SAST) scan of the Apache Superset codebase has identified a medium-severity vulnerability related to improper URL scheme validation. The scanner, Bandit, flagged five distinct locations where the `urlopen` function is used without restricting permitted URL schemes, potentially all...

The Lab · 2026-04-16 04:22:43 · GitHub Issues

3. Apache Superset Code Audit Flags Medium-Severity Path Traversal Risk in URL Handling

A static application security testing (SAST) scan of the Apache Superset codebase has identified a medium-severity vulnerability related to improper URL scheme validation. The scanner, Bandit, flagged five distinct locations where the code opens URLs without restricting permitted schemes, potentially allowing the use o...

The Lab · 2026-04-20 19:23:01 · GitHub Issues

4. Security Alert: Path Traversal Vulnerability Exposes Server Files in `app.py` Log Viewer

A high-severity path traversal vulnerability has been identified in a web application's log viewer, allowing attackers to read arbitrary files on the server. The flaw resides in the `show_logs` route within the `app.py` file, where user-supplied input is used directly to open files without any sanitization. By manipula...

The Lab · 2026-04-21 18:22:55 · GitHub Issues

5. Security Alert: Local File Inclusion Vulnerability Exposed in `app.py` Admin Endpoint

A high-severity Local File Inclusion (LFI) and Path Traversal vulnerability has been identified in a critical administrative endpoint. The flaw, located in the `show_logs` function of `app.py`, allows an authenticated admin user to read sensitive system files far beyond the intended logs directory. By manipulating the ...

The Lab · 2026-04-21 18:22:56 · GitHub Issues

6. Security Alert: Path Traversal in `app.py` Allows Arbitrary File Overwrite

A high-severity security vulnerability in a Python application's `app.py` file allows attackers to overwrite critical system files. The flaw, a classic path traversal (CWE-22), resides in the `upload_file` function at line 220, where user-supplied filenames are used directly without sanitization. By submitting a malici...

The Lab · 2026-04-22 23:54:11 · GitHub Issues

7. Critical Volume Deletion Flaw Found in deleteViaEphemeral: Entire /configs Mount Wiped Regardless of FilePath

A critical scope vulnerability has been identified in the `deleteViaEphemeral` utility function, classified under F1085 and mapped to CWE-78 and CWE-22. The flaw causes the function to delete the entire `/configs` volume mount rather than scoped individual files, representing a severe data destruction risk for any syst...

The Lab · 2026-04-26 04:54:07 · GitHub Issues

8. Critical CWE-22 Path Traversal Vulnerability Patched in File Upload Route

A critical path traversal vulnerability has been remediated in the file upload endpoint at `packages/lib/services/rest/routes/resources.ts`. The flaw, designated CWE-22, enabled attackers to access or modify arbitrary filesystem locations on the server by exploiting insufficient input validation on file paths during mu...

The Lab · 2026-04-27 02:54:07 · GitHub Issues

9. CVE-2026-4307: Path Traversal Vulnerability Disclosed in Agent Zero v0.9.7–10

A documented path traversal vulnerability, tracked as CVE-2026-4307 and classified under CWE-22, has been disclosed in Agent Zero, an AI agent framework. The flaw affects versions 0.9.7 through 0.9.10, exposing systems to potential file system access beyond intended boundaries. The vulnerability was identified and repo...

The Lab · 2026-04-29 16:54:11 · GitHub Issues

10. Path Traversal Protection Found Incomplete in Backend Server — URL Encoding Bypass Unguarded

A security audit has identified a significant gap in path traversal defenses within `backend/server.js`. The file operations module at lines 176-218 currently implements only basic pattern matching for parent directory traversal sequences (`../` and `..\`), leaving the system potentially vulnerable to Unicode and URL e...