WhisperX tag archive

#path-traversal

This page collects WhisperX intelligence signals tagged #path-traversal. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (20)

The Lab · 2026-03-26 19:27:34 · GitHub Issues

1. Path Traversal Vulnerability in minimax_cli/acp/server.py Exposes Sensitive System Files

A high-severity path traversal vulnerability has been identified in the `minimax_cli` project, exposing the server to unauthorized file access. The flaw resides in the `src/minimax_cli/acp/server.py` file, where file operations lack any path validation. This allows attackers to perform directory traversal attacks, esca...

The Lab · 2026-03-28 10:27:02 · GitHub Issues

2. Critical Path Traversal in aos-workspace MCP Server Exposes Full Filesystem Read

A critical path traversal vulnerability in the `aos-workspace` MCP server allows any authenticated client to read arbitrary files from the host's entire filesystem. The flaw, located in the `index.js` file, stems from a failure to validate that a resolved file path remains within the intended workspace root directory (...

The Lab · 2026-03-31 17:27:26 · GitHub Issues

3. Express.js View System Exposed: Path Traversal Flaw in `View.prototype.lookup()`

A critical security vulnerability has been identified in the Express.js view rendering system. The `View.prototype.lookup()` function lacks a fundamental path containment check, exposing applications that pass user input to `res.render()` to path traversal attacks. Unlike the protected `res.sendFile()` method, which us...

The Lab · 2026-04-01 02:26:57 · GitHub Issues

4. P1 Vulnerability in XPN: Zip Extraction Exposes Path Traversal Risk

A critical security flaw in the XPN software's archive handling allows attackers to write files anywhere on a user's system. The vulnerability, a classic 'zip-slip' attack, resides in the `XOutshine.h` export module. The code directly passes user-supplied filenames from a `.xpn` archive to the extraction function witho...

The Lab · 2026-04-03 13:27:03 · GitHub Issues

5. StaticFilesMiddleware Path Traversal Vulnerability: Insufficient Sanitization Exposes Server Files

A critical path traversal vulnerability exists within the `StaticFilesMiddleware` component, exposing server files to unauthorized access. The flaw stems from an insufficient sanitization routine that uses a simple `str_replace('..', '/', ...)` to block directory traversal attempts. This protection is easily bypassed u...

The Lab · 2026-04-03 21:27:09 · GitHub Issues

6. FinSpark API Exposed: Path Traversal Flaw Lets Attackers Write to Server Filesystem

A critical path traversal vulnerability in the FinSpark API allows attackers to write arbitrary files anywhere on the server filesystem. The flaw is in the document upload endpoint, where the system blindly trusts the `file.filename` provided by the client. By submitting a filename like `../../etc/cron.d/backdoor`, an ...

The Lab · 2026-04-11 02:22:28 · GitHub Issues

7. Critical Security Flaw in py-bugger CLI: Path Traversal via --target-dir Parameter

A critical security vulnerability has been identified in the py-bugger tool, exposing systems to potential path traversal attacks. The flaw resides in the `_check_git_status()` function within the CLI utilities, where user-supplied input is passed directly to a subprocess call without any sanitization. This allows an a...

The Lab · 2026-04-14 02:22:22 · GitHub Issues

8. Spring Framework MVC 曝路径遍历漏洞 (CVE-2025-41242),特定部署条件下可导致敏感信息泄露

Spring Framework 的核心 Web 模块 `spring-webmvc` 被曝存在一个中等严重性的路径遍历漏洞(CVE-2025-41242,GHSA-r936-gwx5-v52f)。该漏洞在特定部署条件下,可能允许攻击者绕过安全限制,访问 Web 应用程序根目录之外的文件,导致敏感信息泄露。其 CVSS v3.1 评分为 7.5,归类为 CWE-22(路径遍历)。 该漏洞的触发条件较为具体,需要同时满足三个关键因素:首先,应用程序必须以 WAR 包形式部署,或使用嵌入式 Servlet 容器;其次,所使用的 Servlet 容器未能按照 Jakarta Servlet 6.1 规范的要求,拒绝包含可疑序列(如 `....

The Lab · 2026-04-16 23:22:55 · GitHub Issues

9. Mako Template Engine Path Traversal Vulnerability Exposed in GitHub Security Advisory GHSA-v92g-xgxw-vvmm

A critical path traversal vulnerability has been disclosed in the widely-used Mako templating engine for Python, tracked as GHSA-v92g-xgxw-vvmm. The flaw resides in the `TemplateLookup.get_template()` function, which fails to properly sanitize user-supplied template URIs. Specifically, an attacker can exploit an incons...

The Lab · 2026-04-16 23:22:56 · GitHub Issues

10. Mako Template Engine Exposes Path Traversal Vulnerability in `TemplateLookup.get_template()`

A critical path traversal vulnerability has been disclosed in the Mako templating engine, a core component used by major Python web frameworks. The flaw, tracked as GHSA-v92g-xgxw-vvmm, resides in the `TemplateLookup.get_template()` function, allowing attackers to potentially access sensitive files outside the intended...

The Lab · 2026-04-18 05:22:29 · GitHub Issues

11. Vite ServeStaticFiles Middleware Exposes Path Traversal Risk on Windows, Symlink Systems

A security vulnerability in Vite's core static file server could allow attackers to bypass directory traversal protections. The flaw resides in the `ServeStaticFiles` middleware, where the current defense mechanism using `path.resolve()` with a `'.' +` prefix and a `startsWith()` check is insufficient. This design can ...

The Lab · 2026-04-21 04:22:39 · GitHub Issues

12. H3 Web Framework Exposes Path Traversal Flaw: Arbitrary File Read Risk in serveStatic()

A medium-severity security vulnerability in the popular H3 web framework allows attackers to bypass directory restrictions and read arbitrary files from a server's filesystem. The flaw, tracked as GHSA-wr4h-v87w-p3r7, resides in the `serveStatic()` utility function. Attackers can exploit it by crafting HTTP requests wi...

The Lab · 2026-04-21 04:22:40 · GitHub Issues

13. H3 Framework 'serveStatic' Vulnerability (GHSA-72gr-qfp7-vwhw) Exposes Path Traversal Risk

A medium-severity vulnerability in the popular H3 web framework's `serveStatic` utility creates a path traversal risk, potentially allowing attackers to access sensitive files on servers using affected versions. The flaw, tracked as GHSA-72gr-qfp7-vwhw, stems from a redundant `decodeURI()` call that enables bypassing b...

The Lab · 2026-04-21 18:22:56 · GitHub Issues

14. Security Alert: Path Traversal in `app.py` Allows Arbitrary File Overwrite

A high-severity security vulnerability in a Python application's `app.py` file allows attackers to overwrite critical system files. The flaw, a classic path traversal (CWE-22), resides in the `upload_file` function at line 220, where user-supplied filenames are used directly without sanitization. By submitting a malici...

The Lab · 2026-04-22 11:27:32 · GitHub Issues

15. Critical Shell Injection Regression in deleteViaEphemeral Exposes Staging to Path Traversal

A critical security regression has been identified in the staging environment at commit 36240c75, involving the deleteViaEphemeral function. The vulnerability, catalogued as F1502 under CWE-78 (OS Command Injection), stems from shell string concatenation in the deletion logic. The affected code constructs the command a...

The Lab · 2026-04-22 12:27:30 · GitHub Issues

16. Stellar APY Relayer Vulnerability: Unsanitized ProtocolID Opens Path Traversal and SSRF Attack Surface

A critical security flaw has been identified in the Stellar protocol's APY relayer implementation. The `FetchProtocolAPY` function in `internal/stellar/apy_relayer.go` constructs HTTP request URLs by concatenating a base URL with a `protocolID` parameter sourced directly from the on-chain yield registry — without any U...

The Lab · 2026-04-22 15:27:40 · GitHub Issues

17. CVE-2026-41140: Poetry 2.3.4 Patches Critical Path Traversal Vulnerability in Tar Extraction

Poetry, the widely adopted Python dependency management tool, has released version 2.3.4 to address a critical path traversal vulnerability in its tar extraction functionality. Tracked as CVE-2026-41140, the security flaw allows an attacker to write files to arbitrary locations on a system during package installation, ...

The Lab · 2026-04-22 15:27:41 · GitHub Issues

18. Golang Tool Pack Archive Extraction Flaw Exposes Systems to Arbitrary File Write; CVE-2026-39817 Tracked

A critical path traversal vulnerability in Go's internal archive utility tool allows malicious archives to write files to arbitrary filesystem locations. The flaw, tracked as CVE-2026-39817 and now publicly disclosed, affects the `go tool pack` subcommand—a stripped-down archive handler used primarily as an internal co...

The Lab · 2026-04-22 19:27:30 · GitHub Issues

19. Critical Container Escape Flaw F1085 Remains Unpatched on origin/main Branch

A critical security vulnerability allowing container escape through path traversal remains exploitable on the origin/main branch, according to a newly disclosed GitHub issue. The flaw, designated F1085, exists in the deleteViaEphemeral function within container_files.go and exploits how the rm command handles multiple ...

The Lab · 2026-04-23 23:54:17 · GitHub Issues

20. Path Traversal Vulnerability in stock-bot Dashboard Exposes Arbitrary File Read Risk

A high-severity security review of a recent commit to the open-source repository stock-bot has flagged a critical path traversal flaw in its telemetry dashboard. The vulnerability, identified in `dashboard.py` at lines 7248–7298, resides in the `/api/telemetry/latest/computed` endpoint. The endpoint accepts a client-su...