Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-36 (绝对路径遍历) — Vulnerability Class 106

106 vulnerabilities classified as CWE-36 (绝对路径遍历). AI Chinese analysis included.

CWE-36 represents an absolute path traversal weakness where software fails to properly neutralize absolute path sequences, such as "/abs/path," when constructing file paths from external input. Attackers typically exploit this vulnerability by injecting absolute paths into user-controlled parameters, causing the application to resolve file locations outside the intended restricted directory. This allows unauthorized access to sensitive system files or directories that should remain inaccessible. To prevent such exploits, developers must rigorously validate and sanitize all user-supplied path inputs, ensuring they conform to expected formats and remain within designated boundaries. Implementing strict allow-lists for permitted directories and using secure API functions that inherently restrict path resolution can effectively mitigate this risk. Additionally, employing chroot jails or containerization further isolates file access, reducing the impact of any potential traversal attempts.

MITRE CWE Description
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize absolute path sequences such as "/abs/path" that can resolve to a location that is outside of that directory. This allows attackers to traverse the file system to access files or directories that are outside of the restricted directory.
Common Consequences (4)
Integrity, Confidentiality, AvailabilityExecute Unauthorized Code or Commands
The attacker may be able to create or overwrite critical files that are used to execute code, such as programs or libraries.
IntegrityModify Files or Directories
The attacker may be able to overwrite or create critical files, such as programs, libraries, or important data. If the targeted file is used for a security mechanism, then the attacker may be able to bypass that mechanism. For example, appending a new account at the end of a password file may allow …
ConfidentialityRead Files or Directories
The attacker may be able read the contents of unexpected files and expose sensitive data. If the targeted file is used for a security mechanism, then the attacker may be able to bypass that mechanism. For example, by reading a password file, the attacker could conduct brute force password guessing a…
AvailabilityDoS: Crash, Exit, or Restart
The attacker may be able to overwrite, delete, or corrupt unexpected critical files such as programs, libraries, or important data. This may prevent the product from working at all and in the case of a protection mechanisms such as authentication, it has the potential to lockout every user of the pr…
Mitigations (3)
ImplementationAssume all input is malicious. Use an "accept known good" input validation strategy, i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any input that does not strictly conform to specifications, or transform it into something that does. When performing input validation, consider all potentially relevant properties, including length, type of input, the full range…
Effectiveness: High
ImplementationInputs should be decoded and canonicalized to the application's current internal representation before being validated (CWE-180). Make sure that the application does not decode the same input twice (CWE-174). Such errors could be used to bypass allowlist validation schemes by introducing dangerous inputs after they have been checked.
OperationUse an application firewall that can detect attacks against this weakness. It can be beneficial in cases in which the code cannot be fixed (because it is controlled by a third party), as an emergency prevention measure while more comprehensive software assurance measures are applied, or to provide defense in depth [REF-1481].
Effectiveness: Moderate
Examples (2)
In the example below, the path to a dictionary file is read from a system property and used to initialize a File object.
String filename = System.getProperty("com.domain.application.dictionaryFile"); File dictionaryFile = new File(filename);
Bad · Java
This script intends to read a user-supplied file from the current directory. The user inputs the relative path to the file and the script uses Python's os.path.join() function to combine the path to the current working directory with the provided path to the specified file. This results in an absolute path to the desired file. If the file does not exist when the script attempts to read it, an erro…
import os import sys def main(): filename = sys.argv[1] path = os.path.join(os.getcwd(), filename) try: with open(path, 'r') as f: file_data = f.read() except FileNotFoundError as e: print("Error - file not found") main()
Bad · Python
import os import sys def main(): filename = sys.argv[1] path = os.path.normpath(f"{os.getcwd()}{os.sep}{filename}") if path.startswith("/home/cwe/documents/"): try: with open(path, 'r') as f: file_data = f.read() except FileNotFoundError as e: print("Error - file not found") main()
Good · Python
CVE IDTitleCVSSSeverityPublished
CVE-2025-8912 WellChoose|Organization Portal System - Arbitrary File Reading through Path Traversal — Organization Portal System 7.5 High2025-08-13
CVE-2025-8909 WellChoose|Organization Portal System - Arbitrary File Reading through Path Traversal — Organization Portal System 6.5 Medium2025-08-13
CVE-2025-8213 NinjaScanner – Virus & Malware scan <= 3.2.5 - Authenticated (Administrator+) Arbitrary File Deletion — NinjaScanner – Virus & Malware scan 7.2 High2025-07-31
CVE-2025-53079 SAMSUNG DMS 安全漏洞 — Data Management Server 4.9 Medium2025-07-29
CVE-2025-8009 Security Ninja – Secure Firewall & Secure Malware Scanner - 5.201 - 5.242 - Authenticated (Administrator+) Arbitrary File Read — Security Ninja – WordPress Security Plugin & Firewall 4.9 Medium2025-07-24
CVE-2025-6381 BeeTeam368 Extensions <= 2.3.4 - Authenticated (Subscriber+) Directory Traversal to Arbitrary File Deletion — BeeTeam368 Extensions 8.8 High2025-06-28
CVE-2025-53392 Netgate pfSense CE 安全漏洞 — pfSense 5.0 Medium2025-06-28
CVE-2025-5927 Everest Forms (Pro) <= 1.9.4 - Unauthenticated Path Traversal to Arbitrary File Deletion — Everest Forms Pro 7.5 High2025-06-25
CVE-2025-4799 WP-DownloadManager <= 1.68.10 - Authenticated (Administrator+) Arbitrary File Deletion — WP-DownloadManager 7.2 High2025-06-11
CVE-2025-36574 Dell Wyse Management Suite WMS 安全漏洞 — Wyse Management Suite 8.2 High2025-06-10
CVE-2024-13945 Stored Absolute Path Traversal — ASPECT-Enterprise 6.0 Medium2025-05-23
CVE-2024-48850 Authenticated Absolute Path Traversal — ASPECT-Enterprise 7.2 High2025-05-22
CVE-2025-46822 Unauthenticated Arbitrary File Read via Absolute Path — Java-springboot-codebase 7.5AIHighAI2025-05-21
CVE-2024-10833 Arbitrary File Write in eosphoros-ai/db-gpt — eosphoros-ai/db-gpt 8.8 -2025-03-20
CVE-2024-12375 Local File Inclusion in automatic1111/stable-diffusion-webui — automatic1111/stable-diffusion-webui 7.5 -2025-03-20
CVE-2024-6854 Arbitrary File Overwrite in h2oai/h2o-3 — h2oai/h2o-3 7.5 -2025-03-20
CVE-2024-10047 Directory Listing Vulnerability in parisneo/lollms-webui — parisneo/lollms-webui 5.3 -2025-03-20
CVE-2024-10831 Arbitrary File Write through Absolute Path Traversal in eosphoros-ai/db-gpt — eosphoros-ai/db-gpt 7.5 -2025-03-20
CVE-2024-8501 Arbitrary File Download in modelscope/agentscope — modelscope/agentscope 8.8 -2025-03-20
CVE-2024-48248 Nakivo Backup & Replication 安全漏洞 — Backup & Replication Director 8.6 High2025-03-04
CVE-2025-0001 authenticated arbitrary file read vulnerability — Abacus 6.5 Medium2025-02-17
CVE-2024-6097 Absolute Path Traversal Vulnerability — Progress® Telerik® Reporting 5.3 Medium2025-02-12
CVE-2024-57966 KDE Ark 安全漏洞 — ark 5.0 Medium2025-02-03
CVE-2025-0851 Path traversal issue in Deep Java Library — DeepJavaLibrary 9.8 Critical2025-01-29
CVE-2024-13159 Ivanti EPM 安全漏洞 — Endpoint Manager 9.8 Critical2025-01-14
CVE-2024-13160 Ivanti EPM 安全漏洞 — Endpoint Manager 9.8 Critical2025-01-14
CVE-2024-13161 Ivanti EPM 安全漏洞 — Endpoint Manager 9.8 Critical2025-01-14
CVE-2024-10811 Ivanti EPM 安全漏洞 — Endpoint Manager 9.8 Critical2025-01-14
CVE-2024-51549 Absolute Path Traversal — ASPECT-Enterprise 10.0 Critical2024-12-05
CVE-2024-11978 Interinfo DreamMaker - Arbitrary File Reading through Path Traversal — DreamMaker 7.5 High2024-11-29

Vulnerabilities classified as CWE-36 (绝对路径遍历) represent 106 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.