1 vulnerabilities classified as CWE-43 (路径等价:’filename….’ (多个尾部的点号)). AI Chinese analysis included.
CWE-43 represents a path traversal weakness where software fails to properly validate input containing multiple trailing dots, such as "filename....". This vulnerability arises because different operating systems and file parsers handle these dots inconsistently, leading to ambiguous path resolution. Attackers typically exploit this by injecting sequences of trailing dots into file path inputs, tricking the application into resolving the path to unintended directories or sensitive system files outside the expected scope. To mitigate this risk, developers must implement strict input validation that rejects or normalizes paths containing multiple trailing dots. Additionally, using canonicalization libraries to resolve paths to their absolute, normalized forms before processing ensures consistent behavior across platforms, thereby preventing attackers from leveraging parsing discrepancies to bypass security controls and access unauthorized resources.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-10353 | Missing Authorization vulnerability in Melis Platform — Melis Platform | 8.8AI | HighAI | 2025-10-08 |
Vulnerabilities classified as CWE-43 (路径等价:’filename….’ (多个尾部的点号)) represent 1 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.