Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-35 (路径遍历:’…/…//’) — Vulnerability Class 149

149 vulnerabilities classified as CWE-35 (路径遍历:’…/…//’). AI Chinese analysis included.

CWE-35 represents a critical path traversal vulnerability where software fails to properly sanitize input containing the specific sequence ‘.../...//’. This weakness allows attackers to bypass directory restrictions by exploiting how certain operating systems or application frameworks resolve these unusual path segments. By injecting this sequence into user-controlled input, an adversary can manipulate file system navigation to access sensitive files located outside the intended restricted directory, potentially leading to unauthorized data disclosure or system compromise. Developers mitigate this risk by implementing rigorous input validation that strictly rejects or neutralizes all path traversal characters, including this specific triple-dot variant. Additionally, using canonicalization functions to resolve paths before comparison and enforcing strict allow-lists for permitted file extensions ensures that external input cannot redirect execution to unintended system locations.

MITRE CWE Description
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '.../...//' (doubled triple dot slash) sequences that can resolve to a location that is outside of that directory.
Common Consequences (1)
Confidentiality, IntegrityRead Files or Directories, Modify Files or Directories, Bypass Protection Mechanism
Not properly neutralizing '.../...//' (doubled triple dot slash) allows attackers to traverse the file system to access files or directories that are outside of the restricted directory.
Mitigations (2)
ImplementationAssume all input is malicious. Use an "accept known good" input validation strategy, i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any input that does not strictly conform to specifications, or transform it into something that does. When performing input validation, consider all potentially relevant properties, including length, type of input, the full range…
Effectiveness: High
ImplementationInputs should be decoded and canonicalized to the application's current internal representation before being validated (CWE-180). Make sure that the application does not decode the same input twice (CWE-174). Such errors could be used to bypass allowlist validation schemes by introducing dangerous inputs after they have been checked.
Examples (1)
Suppose the product serves files from a specific "public" directory -- /home/product/public/ -- and has an algorithm that attempts to protect against common path traversal attacks. The algorithm works by sequentially scanning through a requested filename and removes each occurrence of "../" that it encounters, then appending the filename to the public directory.
../secret.dat
Attack
/home/product/public/secret.dat
Result
CVE IDTitleCVSSSeverityPublished
CVE-2026-42274 Heimdall: Authorization bypass via path normalization mismatch — heimdall--2026-05-08
CVE-2026-20034 Cisco Unity Connection Remote Code Execution Vulnerability — Cisco Unity Connection 8.8 High2026-05-06
CVE-2026-0205 SonicWALL SonicOS 安全漏洞 — SonicOS 8.1AIHighAI2026-04-29
CVE-2026-6074 Path traversal: '.../...//' in Intrado 911 Emergency Gateway (EGW) — 911 Emergency Gateway 9.8AICriticalAI2026-04-23
CVE-2026-28265 Dell PowerStore 安全漏洞 — PowerStore 4.4 Medium2026-04-01
CVE-2026-25397 WordPress File Uploader for WooCommerce plugin <= 1.0.4 - Path Traversal vulnerability — File Uploader for WooCommerce 7.5 High2026-03-25
CVE-2026-32415 WordPress Squeeze plugin <= 1.7.7 - Directory Traversal vulnerability — Squeeze 5.0 Medium2026-03-13
CVE-2026-26124 Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability — Microsoft ACI Confidential Containers 6.7 Medium2026-03-05
CVE-2025-69325 WordPress Primer MyData for Woocommerce plugin <= 4.2.8 - Path Traversal vulnerability — Primer MyData for Woocommerce 5.3 Medium2026-02-20
CVE-2025-58381 Directory transversal vulnerability in Brocade Fabric OS before 9.2.1c2 and 9.2.2 through 9.2.2a using various shell commands — Fabric OS 7.2AIHighAI2026-02-03
CVE-2025-58380 Directory transversal vulnerability in Brocade Fabric OS before 9.2.1 using grep command — Fabric OS 6.5AIMediumAI2026-02-03
CVE-2025-59099 Unauthenticated Path Traversal in dormakaba access manager — Access Manager 92xx-k5 9.1AICriticalAI2026-01-26
CVE-2025-67914 WordPress VidMov theme <= 2.3.8 - Path Traversal vulnerability — VidMov 7.7 High2026-01-08
CVE-2025-46256 WordPress Advanced Database Cleaner PRO Plugin <= 3.2.10 - Limited .txt Path Traversal vulnerability — Advanced Database Cleaner PRO 6.4 Medium2026-01-07
CVE-2025-68428 jsPDF has Local File Inclusion/Path Traversal vulnerability — jsPDF 6.5 -2026-01-05
CVE-2025-28973 WordPress Pro Bulk Watermark Plugin for WordPress <= 2.0 - Path Traversal Vulnerability — Pro Bulk Watermark Plugin for WordPress 6.5 Medium2025-12-31
CVE-2025-64676 Microsoft Purview eDiscovery Remote Code Execution Vulnerability — Microsoft Purview 7.2 High2025-12-18
CVE-2025-64253 WordPress Health Check & Troubleshooting plugin <= 1.7.1 - Path Traversal vulnerability — Health Check & Troubleshooting 4.9 Medium2025-12-16
CVE-2025-66004 Local privilege escalation in usbmuxd from arbitrary local user to usbmux — usbmuxd 5.7 Medium2025-12-10
CVE-2025-41736 Possible arbitrary code execution — Energy-Controlling EWIO2-M 8.8 High2025-11-18
CVE-2025-5454 AXIS OS 安全漏洞 — AXIS OS 6.4 Medium2025-11-11
CVE-2025-58972 WordPress Barcode Scanner with Inventory & Order Manager plugin <= 1.10.4 - Path Traversal vulnerability — Barcode Scanner with Inventory & Order Manager 7.2 High2025-11-06
CVE-2025-48090 WordPress Blanka - One Page WordPress Theme Theme < 1.5 - Local File Inclusion Vulnerability — Blanka - One Page WordPress Theme 8.1 High2025-11-06
CVE-2025-39467 WordPress Wanderland theme <= 1.7.1 - Local File Inclusion Vulnerability — Wanderland 8.1 High2025-11-06
CVE-2025-22288 WordPress Smush Image Compression and Optimization plugin <= 3.17.0 - Directory Traversal vulnerability — Smush Image Compression and Optimization 4.1 Medium2025-11-06
CVE-2025-53880 susemanager-tftpsync-recv allows arbitrary file creation and deletion due to path traversal — Container suse/manager/4.3/proxy-httpd:latest 6.5AIMediumAI2025-10-30
CVE-2025-41723 Sauter: Directory Traversal in importFile SOAP Method — modulo 6 devices modu680-AS 9.8 Critical2025-10-22
CVE-2025-8051 Path traversal validation vulnerability has been discovered in opentext Flipper. — Flipper 6.5AIMediumAI2025-10-20
CVE-2025-42937 Directory Traversal vulnerability in SAP Print Service — SAP Print Service 9.8 Critical2025-10-14
CVE-2025-43907 Dell PowerProtect Data Domain 安全漏洞 — PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release 6.5 Medium2025-10-07

Vulnerabilities classified as CWE-35 (路径遍历:’…/…//’) represent 149 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.