CWE-22
High likelihoodImproper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
8,747 vulnerabilities with CWE-22
CVE-2026-6636
MEDIUM
p2r3 convert API buildCache.js Bun.serve path traversal
CVSS 4.3
CVE-2026-6620
MEDIUM
SonicCloudOrg sonic-server File Upload Endpoint FileTool.java upload path traversal
CVSS 6.3
CVE-2026-6615
HIGH
TransformerOptimus SuperAGI Multipart Upload resources.py upload path traversal
CVSS 7.3
CVE-2026-6591
MEDIUM
ComfyUI LoadImage Node folder_paths.py folder_paths.get_annotated_filepath path traversal
CVSS 4.3
CVE-2026-6590
MEDIUM
ComfyUI Model Preview Endpoint model_manager.py get_model_preview path traversal
CVSS 4.3
CVE-2026-6568
HIGH
kodcloud KodExplorer Public Share share.class.php initShareOld path traversal
CVSS 7.3
CVE-2026-40491
MEDIUM
gdown Affected by Arbitrary File Write via Path Traversal in gdown.extractall
CVSS 6.5
CVE-2026-40258
CRITICAL
Gramps Web API has Zip Slip Path Traversal in Media Archive Import
CVSS 9.1
CVE-2026-40342
CRITICAL
Firebird: Path Traversal + Arbitrary File Write Leads to Remote Code Execution
CVSS 9.9
CVE-2026-5710
HIGH
Drag and Drop Multiple File Upload for Contact Form 7 <= 1.3.9.6 - Unauthenticated Limited Arbitrary File Read via mfile Field
CVSS 7.5
CVE-2026-40518
HIGH
ByteDance DeerFlow Path Traversal and Arbitrary File Write via Bootstrap Mode
CVSS 7.1
CVE-2026-3464
HIGH
WP Customer Area <= 8.3.4 - Authenticated (Subscriber+) Arbitrary File Read/Deletion via ajax_attach_file
CVSS 8.8
CVE-2026-6496
MEDIUM
prasathmani TinyFileManager POST Parameter filemanager.php path traversal
CVSS 5.4
CVE-2026-6487
MEDIUM
Qihui jtbc5 CMS Code Endpoint manage.php path traversal
CVSS 4.3
CVE-2026-4659
HIGH
Unlimited Elements For Elementor <= 2.0.6 - Authenticated (Contributor+) Arbitrary File Read via Path Traversal in Repeater JSON/CSV URL with Path Traversal
CVSS 7.5
CVE-2026-35496
LOW
CubeCart < prior to 6.6.0 - Path Traversal
CVSS 2.7
CVE-2026-4853
MEDIUM
JetBackup <= 3.1.19.8 - Authenticated (Administrator+) Arbitrary Directory Deletion via Path Traversal in 'fileName' Parameter
CVSS 4.9
CVE-2026-6410
MEDIUM
@fastify/static vulnerable to path traversal in directory listing
CVSS 5.3
CVE-2026-40503
MEDIUM
OpenHarness Path Traversal Information Disclosure via /memory show
CVSS 6.5
CVE-2026-21726
MEDIUM
Loki Path Traversal - CVE-2021-36156 Bypass
CVSS 5.3
CVE-2026-40256
MEDIUM
Weblate: Prefix-Based Repository Boundary Check Bypass via Symlink/Junction Path Prefix Collision
CVSS 5.0
CVE-2026-34242
HIGH
Weblate: Arbitrary File Read via Symlink
CVSS 7.7
CVE-2026-33220
MEDIUM
Weblate: JavaScript localization CDN add-on allows arbitrary local file read outside the repository
CVSS 6.8
CVE-2026-30996
HIGH
SAC-NFe 2.0.02 - Path Traversal
CVSS 7.5
CVE-2026-20180
CRITICAL
Cisco Identity Services Engine Multiple Remote Code Execution Vulnerability
CVSS 9.9
Details
Vulnerabilities
8,747
Exploit Likelihood
High