CVE-2023-39026

HIGH EXPLOITED NUCLEI

FileMage Gateway <1.10.8 - Path Traversal

Title source: llm

Description

Directory Traversal vulnerability in FileMage Gateway Windows Deployments v.1.10.8 and before allows a remote attacker to obtain sensitive information via a crafted request to the /mgmt/ component.

Exploits (1)

exploitdb WORKING POC
by Bryce Raindayzz Harty · pythonwebappsmultiple
https://www.exploit-db.com/exploits/51708

Nuclei Templates (1)

FileMage Gateway - Directory Traversal
HIGHVERIFIEDby DhiyaneshDk
Shodan: title:"FileMage" || cpe:"cpe:2.3:o:microsoft:windows"

Scores

CVSS v3 7.5
EPSS 0.8146
EPSS Percentile 99.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Details

VulnCheck KEV 2023-12-04
CWE
CWE-22
Status published
Products (1)
filemage/filemage < 1.10.8
Published Aug 22, 2023
Tracked Since Feb 18, 2026