Browse all 4 CVE security advisories affecting OpenAPITools. AI-powered Chinese analysis, POCs, and references for each vulnerability.
OpenAPITools provides open-source tooling for API specification, design, documentation, and testing. Historically, the project has faced vulnerabilities including remote code execution, cross-site scripting, and privilege escalation, often stemming from improper input validation and insecure deserialization. While no major security incidents have been widely documented, the four recorded CVEs highlight potential risks in components like Swagger UI and Swagger Editor. The project's modular architecture introduces multiple attack surfaces, particularly in web interfaces handling untrusted input. Security remains a focus area with regular updates addressing identified flaws, though users should implement additional validation layers for production deployments.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-35219 | OpenAPI Generator Online - Arbitrary File Read/Delete — openapi-generatorCWE-22 | 8.3 | High | 2024-05-27 |
| CVE-2021-21430 | Creation of Temporary File in Directory with Insecure Permissions in auto-generated Java, Scala code — openapi-generatorCWE-269 | 6.2 | Medium | 2021-05-10 |
| CVE-2021-21428 | Creation of Temporary File in Directory with Insecure Permissions in the OpenAPI-Generator online generator — openapi-generatorCWE-269 | 9.3 | Critical | 2021-05-10 |
| CVE-2021-21429 | Creation of Temporary File in Directory with Insecure Permissions in the OpenAPI Generator Maven plugin — openapi-generatorCWE-552 | 4.0 | Medium | 2021-04-27 |
This page lists every published CVE security advisory associated with OpenAPITools. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.