Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-36 (绝对路径遍历) — Vulnerability Class 106

106 vulnerabilities classified as CWE-36 (绝对路径遍历). AI Chinese analysis included.

CWE-36 represents an absolute path traversal weakness where software fails to properly neutralize absolute path sequences, such as "/abs/path," when constructing file paths from external input. Attackers typically exploit this vulnerability by injecting absolute paths into user-controlled parameters, causing the application to resolve file locations outside the intended restricted directory. This allows unauthorized access to sensitive system files or directories that should remain inaccessible. To prevent such exploits, developers must rigorously validate and sanitize all user-supplied path inputs, ensuring they conform to expected formats and remain within designated boundaries. Implementing strict allow-lists for permitted directories and using secure API functions that inherently restrict path resolution can effectively mitigate this risk. Additionally, employing chroot jails or containerization further isolates file access, reducing the impact of any potential traversal attempts.

MITRE CWE Description
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize absolute path sequences such as "/abs/path" that can resolve to a location that is outside of that directory. This allows attackers to traverse the file system to access files or directories that are outside of the restricted directory.
Common Consequences (4)
Integrity, Confidentiality, AvailabilityExecute Unauthorized Code or Commands
The attacker may be able to create or overwrite critical files that are used to execute code, such as programs or libraries.
IntegrityModify Files or Directories
The attacker may be able to overwrite or create critical files, such as programs, libraries, or important data. If the targeted file is used for a security mechanism, then the attacker may be able to bypass that mechanism. For example, appending a new account at the end of a password file may allow …
ConfidentialityRead Files or Directories
The attacker may be able read the contents of unexpected files and expose sensitive data. If the targeted file is used for a security mechanism, then the attacker may be able to bypass that mechanism. For example, by reading a password file, the attacker could conduct brute force password guessing a…
AvailabilityDoS: Crash, Exit, or Restart
The attacker may be able to overwrite, delete, or corrupt unexpected critical files such as programs, libraries, or important data. This may prevent the product from working at all and in the case of a protection mechanisms such as authentication, it has the potential to lockout every user of the pr…
Mitigations (3)
ImplementationAssume all input is malicious. Use an "accept known good" input validation strategy, i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any input that does not strictly conform to specifications, or transform it into something that does. When performing input validation, consider all potentially relevant properties, including length, type of input, the full range…
Effectiveness: High
ImplementationInputs should be decoded and canonicalized to the application's current internal representation before being validated (CWE-180). Make sure that the application does not decode the same input twice (CWE-174). Such errors could be used to bypass allowlist validation schemes by introducing dangerous inputs after they have been checked.
OperationUse an application firewall that can detect attacks against this weakness. It can be beneficial in cases in which the code cannot be fixed (because it is controlled by a third party), as an emergency prevention measure while more comprehensive software assurance measures are applied, or to provide defense in depth [REF-1481].
Effectiveness: Moderate
Examples (2)
In the example below, the path to a dictionary file is read from a system property and used to initialize a File object.
String filename = System.getProperty("com.domain.application.dictionaryFile"); File dictionaryFile = new File(filename);
Bad · Java
This script intends to read a user-supplied file from the current directory. The user inputs the relative path to the file and the script uses Python's os.path.join() function to combine the path to the current working directory with the provided path to the specified file. This results in an absolute path to the desired file. If the file does not exist when the script attempts to read it, an erro…
import os import sys def main(): filename = sys.argv[1] path = os.path.join(os.getcwd(), filename) try: with open(path, 'r') as f: file_data = f.read() except FileNotFoundError as e: print("Error - file not found") main()
Bad · Python
import os import sys def main(): filename = sys.argv[1] path = os.path.normpath(f"{os.getcwd()}{os.sep}{filename}") if path.startswith("/home/cwe/documents/"): try: with open(path, 'r') as f: file_data = f.read() except FileNotFoundError as e: print("Error - file not found") main()
Good · Python
CVE IDTitleCVSSSeverityPublished
CVE-2026-6418 PaperCut NG/MF: Path Traversal in Shared Account Synchronization — PaperCut NG/MF 2.7 -2026-05-05
CVE-2026-44029 Nix 安全漏洞 — Nix 5.3 Medium2026-05-05
CVE-2026-7217 Deepractice PromptX Document File index.ts read_pdf absolute path traversal — PromptX 5.3 Medium2026-04-28
CVE-2026-34515 AIOHTTP: UNC SSRF/NTLMv2 Credential Theft/Local File Read in static resource handler on Windows — aiohttp 5.3 -2026-04-01
CVE-2026-4373 JetFormBuilder <= 3.5.6.2 - Unauthenticated Arbitrary File Read via Media Field — JetFormBuilder — Dynamic Blocks Form Builder 7.5 High2026-03-21
CVE-2026-0846 Arbitrary File Read via Absolute Path Input in nltk.util.filestring() — nltk/nltk 7.5 -2026-03-09
CVE-2026-2753 Navtor NavBox 安全漏洞 — NavBox 7.5 High2026-03-06
CVE-2026-28414 Gradio has Absolute Path Traversal on Windows with Python 3.13+ — gradio 7.5 High2026-02-27
CVE-2026-26337 Hyland Alfresco Transformation Service Absolute Path Traversal Arbitrary File Read and SSRF — Alfresco Transformation Service (Enterprise) 8.2 High2026-02-19
CVE-2026-1330 HAMASTAR Technology|MeetingHub - Arbitrary File Read — MeetingHub 7.5 High2026-01-22
CVE-2026-1020 Gotac|Police Statistics Database System - Absolute Path Traversal — Police Statistics Database System 5.3 Medium2026-01-16
CVE-2026-1018 Gotac|Police Statistics Database System - Arbitrary File Read — Police Statistics Database System 7.5 High2026-01-16
CVE-2026-20834 Windows Spoofing Vulnerability — Windows 10 Version 1607 4.6 Medium2026-01-13
CVE-2025-15237 Quanta Computer|QOCA aim AI Medical Cloud Platform - Path Traversal — QOCA aim AI Medical Cloud Platform 4.3 Medium2026-01-05
CVE-2025-15236 Quanta Computer|QOCA aim AI Medical Cloud Platform - Path Traversal — QOCA aim AI Medical Cloud Platform 4.3 Medium2026-01-05
CVE-2025-15227 WELLTEND TECHNOLOGY| BPMFlowWebkit - Arbitrary File Read — BPMFlowWebkit 7.5 High2025-12-29
CVE-2025-14848 Advantech WebAccess/SCADA Absolute Path Traversal — WebAccess/SCADA 4.3 Medium2025-12-18
CVE-2025-67898 Mailjet MJML 安全漏洞 — MJML 4.5 Medium2025-12-14
CVE-2025-34392 Barracuda RMM < 2025.1.1 Service Center Absolute Path Traversal RCE — RMM 9.8AICriticalAI2025-12-10
CVE-2025-14253 Galaxy Software Services|Vitals ESP - Arbitrary File Read — Vitals ESP 4.9 Medium2025-12-08
CVE-2025-36357 IBM Planning Analytics Local Directory Traversal — IBM Planning Analytics Local 8.0 High2025-11-17
CVE-2025-7846 WordPress User Extra Fields <= 16.7 - Authenticated (Subscriber+) Arbitrary File Deletion via save_fields Function — WordPress User Extra Fields 8.8 High2025-10-31
CVE-2025-8575 LWS Cleaner <= 2.4.1.3 - Authenticated (Administrator+) Arbitrary File Deletion via 'lws_cl_delete_file' — LWS Cleaner 7.2 High2025-09-12
CVE-2025-9518 atec Debug <= 1.2.22 - Authenticated (Administrator+) Arbitrary File Deletion — atec Debug 7.2 High2025-09-04
CVE-2025-9516 atec Debug <= 1.2.22 - Authenticated (Administrator+) Arbitrary File Read — atec Debug 4.9 Medium2025-09-04
CVE-2025-9259 Uniong|WebITR - Arbitrary File Reading through Path Traversal — WebITR 6.5 Medium2025-08-22
CVE-2025-9258 Uniong|WebITR - Arbitrary File Reading through Path Traversal — WebITR 6.5 Medium2025-08-22
CVE-2025-9257 Uniong|WebITR - Arbitrary File Reading through Path Traversal — WebITR 6.5 Medium2025-08-22
CVE-2025-9256 Uniong|WebITR - Arbitrary File Reading through Path Traversal — WebITR 6.5 Medium2025-08-22
CVE-2025-57790 Path Traversal Vulnerability — CommCell 9.8 -2025-08-20

Vulnerabilities classified as CWE-36 (绝对路径遍历) represent 106 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.