目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CWE-22 对路径名的限制不恰当(路径遍历) 类漏洞列表 3427

CWE-22 对路径名的限制不恰当(路径遍历) 类弱点 3427 条 CVE 漏洞汇总,含 AI 中文分析。

CWE-22 属于路径遍历漏洞,指程序未正确过滤外部输入中的特殊字符,导致构造的文件路径突破受限目录限制。攻击者常利用“../”等序列访问系统敏感文件,窃取数据或执行恶意操作。开发者应严格校验输入,使用白名单机制限制合法字符,并采用绝对路径或规范化处理,确保最终解析路径始终位于预期目录内,从而有效防御此类风险。

MITRE CWE 官方描述
CWE:CWE-22 对受限目录的路径名限制不当('Path Traversal') 英文:产品使用外部输入来构造一个路径名,该路径名旨在标识位于受限父目录下的文件或目录,但产品未能正确中和路径名中可能导致路径名解析到受限目录之外位置的特殊元素。 许多文件操作旨在在受限目录内进行。通过使用“..”和“/”分隔符等特殊元素,攻击者可以逃逸出受限位置,以访问系统中其他位置的文件或目录。最常见的特殊元素之一是“../”序列,在大多数现代操作系统中,它被解释为当前位置的父目录。这被称为相对路径遍历(relative path traversal)。路径遍历(Path Traversal)也涵盖使用绝对路径名(如“/usr/local/bin”)来访问意外文件的情况。这被称为绝对路径遍历(absolute path traversal)。
常见影响 (4)
Integrity, Confidentiality, AvailabilityExecute Unauthorized Code or Commands
The attacker may be able to create or overwrite critical files that are used to execute code, such as programs or libraries.
IntegrityModify Files or Directories
The attacker may be able to overwrite or create critical files, such as programs, libraries, or important data. If the targeted file is used for a security mechanism, then the attacker may be able to bypass that mechanism. For example, appending a new account at the end of a password file may allow …
ConfidentialityRead Files or Directories
The attacker may be able read the contents of unexpected files and expose sensitive data. If the targeted file is used for a security mechanism, then the attacker may be able to bypass that mechanism. For example, by reading a password file, the attacker could conduct brute force password guessing a…
AvailabilityDoS: Crash, Exit, or Restart
The attacker may be able to overwrite, delete, or corrupt unexpected critical files such as programs, libraries, or important data. This may prevent the product from working at all and in the case of protection mechanisms such as authentication, it has the potential to lock out product users.
缓解措施 (5)
ImplementationAssume all input is malicious. Use an "accept known good" input validation strategy, i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any input that does not strictly conform to specifications, or transform it into something that does. When performing input validation, consider all potentially relevant properties, including length, type of input, the full range…
Architecture and DesignFor any security checks that are performed on the client side, ensure that these checks are duplicated on the server side, in order to avoid CWE-602. Attackers can bypass the client-side checks by modifying values after the checks have been performed, or by changing the client to remove the client-side checks entirely. Then, these modified values would be submitted to the server.
ImplementationInputs should be decoded and canonicalized to the application's current internal representation before being validated (CWE-180). Make sure that the application does not decode the same input twice (CWE-174). Such errors could be used to bypass allowlist validation schemes by introducing dangerous inputs after they have been checked. Use a built-in path canonicalization function (such as realpath(…
Architecture and DesignUse a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid [REF-1482].
OperationUse an application firewall that can detect attacks against this weakness. It can be beneficial in cases in which the code cannot be fixed (because it is controlled by a third party), as an emergency prevention measure while more comprehensive software assurance measures are applied, or to provide defense in depth [REF-1481].
Effectiveness: Moderate
代码示例 (2)
The following code could be for a social networking application in which each user's profile information is stored in a separate file. All files are stored in a single directory.
my $dataPath = "/users/cwe/profiles"; my $username = param("user"); my $profilePath = $dataPath . "/" . $username; open(my $fh, "<", $profilePath) || ExitError("profile read error: $profilePath"); print "<ul>\n"; while (<$fh>) { print "<li>$_</li>\n"; } print "</ul>\n";
Bad · Perl
../../../etc/passwd
Attack
In the example below, the path to a dictionary file is read from a system property and used to initialize a File object.
String filename = System.getProperty("com.domain.application.dictionaryFile"); File dictionaryFile = new File(filename);
Bad · Java
CVE ID标题CVSS风险等级Published
CVE-2026-42351 pygeoapi STAC FileSystemProvider路径遍历漏洞 — pygeoapi 7.5 High2026-05-08
CVE-2026-42213 SolidCAM GPPL-IDE inc指令路径穿越漏洞 — SolidCAM-GPPL-IDE--2026-05-08
CVE-2026-7807 SmarterMail < Build 9560 本地文件包含漏洞 — SmarterMail 8.1 High2026-05-08
CVE-2026-42028 novaGallery 相册及缓存图片路由未认证路径遍历漏洞 — novagallery 5.3 Medium2026-05-08
CVE-2026-41887 Flarum LESS 解析器路径穿越漏洞 — framework 4.9 Medium2026-05-08
CVE-2026-41885 i18next-locize-backend 路径遍历/URL注入漏洞 — i18next-locize-backend 6.5 Medium2026-05-08
CVE-2026-42353 i18next-http-middleware路径遍历与SSRF漏洞 — i18next-http-middleware 8.2 High2026-05-08
CVE-2026-41690 i18next-http-middleware 原型污染与路径遍历漏洞 — i18next-http-middleware 8.6 High2026-05-08
CVE-2026-44340 PraisonAI `_safe_extractall` 符号链接绕过任意文件写入 — PraisonAI--2026-05-08
CVE-2026-41493 yard: 潜在任意路径遍历及文件访问漏洞 — yard--2026-05-08
CVE-2026-41491 Dapr 服务调用路径穿越ACL绕过漏洞 — dapr 8.1 High2026-05-08
CVE-2026-8069 PredatorSense V3 本地提权漏洞 — PredatorSense V3--2026-05-08
CVE-2026-44298 Kimai 发票PDF渲染任意文件读取漏洞 — kimai 4.1 Medium2026-05-08
CVE-2026-43940 electerm runWidget路径遍历导致远程代码执行漏洞 — electerm 8.4 High2026-05-08
CVE-2026-8116 xiaozhi-mcphub dxtController.ts 路径遍历漏洞 — xiaozhi-mcphub 6.3 Medium2026-05-07
CVE-2026-8115 short-video-maker REST API 路径穿越漏洞 — short-video-maker 5.3 Medium2026-05-07
CVE-2026-8113 MiniClaw kernel.ts路径穿越漏洞 — MiniClaw 4.3 Medium2026-05-07
CVE-2026-41691 i18next-http-backend 路径遍历与URL注入漏洞 — i18next-http-backend 6.5 Medium2026-05-07
CVE-2026-44243 GitPython 参考API路径遍历漏洞可导致任意文件读写删除 — GitPython--2026-05-07
CVE-2026-41589 Wish SCP路径遍历漏洞允许任意文件读写 — wish 9.6 Critical2026-05-07
CVE-2026-7252 WP-Optimize <= 4.5.2 任意文件删除漏洞 — WP-Optimize – Cache, Compress images, Minify & Clean database to boost page speed & performance 8.1 High2026-05-07
CVE-2026-40982 Spring Cloud Config目录遍历漏洞 — Spring Cloud Config 9.1 Critical2026-05-07
CVE-2026-41203 CI4MS Theme::upload 上传漏洞导致远程代码执行 — ci4ms--2026-05-07
CVE-2026-41202 CI4MS Backup::restore 存在 Zip Slip 导致远程代码执行漏洞 — ci4ms--2026-05-07
CVE-2026-41656 Admidio 文档添加模式下路径遍历漏洞 — admidio 4.5 Medium2026-05-07
CVE-2026-41655 Admidio 贺卡预览路径穿越漏洞 — admidio 6.5 Medium2026-05-07
CVE-2026-40076 OpenMRS Core 模块上传任意文件写入及代码执行漏洞 — openmrs-core--2026-05-06
CVE-2026-7875 NanoClaw主机/容器边界漏洞:出站附件处理 — NanoClaw 8.8 High2026-05-06
CVE-2026-43975 Apache Wicket 文件夹上传路径遍历漏洞 — Apache Wicket--2026-05-06
CVE-2026-6344 Fluent Forms 6.2.1 任意文件读取漏洞 — Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder 4.9 Medium2026-05-06

CWE-22(对路径名的限制不恰当(路径遍历)) 是常见的弱点类别,本平台收录该类弱点关联的 3427 条 CVE 漏洞。