CVE-2026-33686

HIGH

Sharp is Vulnerable to Path Traversal via Unsanitized Extension in FileUtil

Title source: cna

Description

Sharp is a content management framework built for Laravel as a package. Versions prior to 9.20.0 have a path traversal vulnerability in the FileUtil class. The application fails to sanitize file extensions properly, allowing path separators to be passed into the storage layer. In `src/Utils/FileUtil.php`, the `FileUtil::explodeExtension()` function extracts a file's extension by splitting the filename at the last dot. This issue has been patched in version 9.20.0 by properly sanitizing the extension using `pathinfo(PATHINFO_EXTENSION)` instead of `strrpos()`, alongside applying strict regex replacements to both the base name and the extension.

Scores

CVSS v3 8.8
EPSS 0.0002
EPSS Percentile 6.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-22
Status published
Products (2)
code16/sharp < 9.20.0 (2 CPE variants)
code16/sharp 0 - 9.20.0Packagist
Published Mar 26, 2026
Tracked Since Mar 27, 2026