Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-35 (路径遍历:’…/…//’) — Vulnerability Class 149

149 vulnerabilities classified as CWE-35 (路径遍历:’…/…//’). AI Chinese analysis included.

CWE-35 represents a critical path traversal vulnerability where software fails to properly sanitize input containing the specific sequence ‘.../...//’. This weakness allows attackers to bypass directory restrictions by exploiting how certain operating systems or application frameworks resolve these unusual path segments. By injecting this sequence into user-controlled input, an adversary can manipulate file system navigation to access sensitive files located outside the intended restricted directory, potentially leading to unauthorized data disclosure or system compromise. Developers mitigate this risk by implementing rigorous input validation that strictly rejects or neutralizes all path traversal characters, including this specific triple-dot variant. Additionally, using canonicalization functions to resolve paths before comparison and enforcing strict allow-lists for permitted file extensions ensures that external input cannot redirect execution to unintended system locations.

MITRE CWE Description
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '.../...//' (doubled triple dot slash) sequences that can resolve to a location that is outside of that directory.
Common Consequences (1)
Confidentiality, IntegrityRead Files or Directories, Modify Files or Directories, Bypass Protection Mechanism
Not properly neutralizing '.../...//' (doubled triple dot slash) allows attackers to traverse the file system to access files or directories that are outside of the restricted directory.
Mitigations (2)
ImplementationAssume all input is malicious. Use an "accept known good" input validation strategy, i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any input that does not strictly conform to specifications, or transform it into something that does. When performing input validation, consider all potentially relevant properties, including length, type of input, the full range…
Effectiveness: High
ImplementationInputs should be decoded and canonicalized to the application's current internal representation before being validated (CWE-180). Make sure that the application does not decode the same input twice (CWE-174). Such errors could be used to bypass allowlist validation schemes by introducing dangerous inputs after they have been checked.
Examples (1)
Suppose the product serves files from a specific "public" directory -- /home/product/public/ -- and has an algorithm that attempts to protect against common path traversal attacks. The algorithm works by sequentially scanning through a requested filename and removes each occurrence of "../" that it encounters, then appending the filename to the public directory.
../secret.dat
Attack
/home/product/public/secret.dat
Result
CVE IDTitleCVSSSeverityPublished
CVE-2025-32950 io.jmix.localfs:jmix-localfs has a Path Traversal in Local File Storage — jmix 6.5 Medium2025-04-22
CVE-2025-39470 WordPress Ivy School theme <= 1.6.0 - Local File Inclusion Vulnerability — Ivy School 8.1 High2025-04-18
CVE-2025-24907 Hitachi Vantara Pentaho Data Integration & Analytics – Path Traversal — Pentaho Data Integration & Analytics 6.8 Medium2025-04-16
CVE-2025-24908 Hitachi Vantara Pentaho Data Integration & Analytics – Path Traversal — Pentaho Data Integration & Analytics 6.8 Medium2025-04-16
CVE-2025-39598 WordPress Administrator Z plugin <= 2025.03.28 - Directory Traversal Vulnerability — Administrator Z 4.9 Medium2025-04-16
CVE-2025-30966 WordPress WPJobBoard plugin < 5.11.1 - Path Traversal vulnerability — WPJobBoard 5.4 Medium2025-04-15
CVE-2025-32585 WordPress Shop Products Filter Plugin <= 1.2 - Local File Inclusion vulnerability — Shop Products Filter 7.5 High2025-04-11
CVE-2025-30014 Directory Traversal vulnerability in SAP Capital Yield Tax Management — SAP Capital Yield Tax Management 7.7 High2025-04-08
CVE-2025-30834 WordPress Bit Assist plugin <= 1.5.4 - Path Traversal vulnerability — Bit Assist 7.5 High2025-04-01
CVE-2024-54362 WordPress GetShop ecommerce plugin <= 1.3 - Path Traversal vulnerability — GetShop ecommerce 8.1 High2025-03-28
CVE-2025-26940 WordPress Pie Register Premium plugin <= 3.8.3.2 - Path Traversal to Non-Arbitrary File Deletion vulnerability — Pie Register Premium 6.3 Medium2025-03-15
CVE-2025-27274 WordPress GPX Viewer plugin <= 2.2.11 - Path Traversal vulnerability — GPX Viewer 4.9 Medium2025-03-03
CVE-2025-25122 WordPress WizShop Plugin <= 3.0.2 - Local File Inclusion vulnerability — WizShop 8.1 High2025-03-03
CVE-2025-26935 WordPress WP Job Portal plugin <= 2.2.8 - Local File Inclusion vulnerability — WP Job Portal 7.5 High2025-02-25
CVE-2025-26876 WordPress Search with Typesense Plugin <= 2.0.8 - Path Traversal vulnerability — Search with Typesense 6.8 Medium2025-02-25
CVE-2025-26357 Q-Free MAXTIME Suite 安全漏洞 — MaxTime 4.9 Medium2025-02-12
CVE-2025-26356 Q-Free MAXTIME Suite 安全漏洞 — MaxTime 7.2 High2025-02-12
CVE-2025-26355 Q-Free MAXTIME Suite 安全漏洞 — MaxTime 6.5 Medium2025-02-12
CVE-2025-26354 Q-Free MAXTIME Suite 安全漏洞 — MaxTime 7.2 High2025-02-12
CVE-2025-26353 Q-Free MAXTIME Suite 安全漏洞 — MaxTime 4.9 Medium2025-02-12
CVE-2025-26352 Q-Free MAXTIME Suite 安全漏洞 — MaxTime 6.5 Medium2025-02-12
CVE-2025-26351 Q-Free MAXTIME Suite 安全漏洞 — MaxTime 4.9 Medium2025-02-12
CVE-2025-24786 Path traversal opening Sqlite3 database in WhoDB — whodb 10.0 Critical2025-02-06
CVE-2025-0858 Certain Poly Devices – Path Traversal Vulnerability - Arbitrary File Access by Unauthorized User — Certain Poly Devices 7.5 -2025-02-05
CVE-2025-22205 Extension - admiror-design-studio.com - Path traversal in the Admiror Gallery 4.x component for Joomla — Admiror Gallery component for Joomla 7.5 -2025-02-04
CVE-2025-24685 WordPress Morkva UA Shipping plugin <= 1.0.18 - Local File Inclusion vulnerability — Morkva UA Shipping 8.1 High2025-01-27
CVE-2025-22786 WordPress ElementInvader Addons for Elementor plugin <= 1.2.6 - Local File Inclusion vulnerability — ElementInvader Addons for Elementor 7.5 High2025-01-15
CVE-2024-49249 WordPress SMSA Shipping plugin <= 2.3 - Arbitrary File Deletion vulnerability — SMSA Shipping 8.6 High2025-01-07
CVE-2024-56045 WordPress WPLMS plugin < 1.9.9.5 - Unauthenticated Arbitrary Directory Deletion vulnerability — WPLMS 9.3 Critical2024-12-31
CVE-2024-56213 WordPress Eventin plugin <= 4.0.7 - Contributor+ Limited Local File Inclusion vulnerability — Eventin 6.5 Medium2024-12-31

Vulnerabilities classified as CWE-35 (路径遍历:’…/…//’) represent 149 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.