Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-22 (对路径名的限制不恰当(路径遍历)) — Vulnerability Class 3327

3327 vulnerabilities classified as CWE-22 (对路径名的限制不恰当(路径遍历)). AI Chinese analysis included.

CVE IDTitleCVSSSeverityPublished
CVE-2026-32771 Monitoring is vulnerable to Archive Slip due to missing checks in sanitization — monitoring 9.1 -2026-03-20
CVE-2026-32033 OpenClaw < 2026.2.24 - Path Traversal via @-prefixed Absolute Paths in Workspace Boundary Validation — OpenClaw 6.5 Medium2026-03-19
CVE-2026-32030 OpenClaw < 2026.2.19 - Sensitive File Disclosure via stageSandboxMedia Path Traversal — OpenClaw 7.5 High2026-03-19
CVE-2026-32026 OpenClaw < 2026.2.24 - Arbitrary File Read via Improper Temporary Path Validation in Sandbox — OpenClaw 6.5 Medium2026-03-19
CVE-2026-32007 OpenClaw < 2026.2.23 - Sandbox Bypass in apply_patch Tool via Workspace-Only Check Bypass — OpenClaw 6.8 Medium2026-03-19
CVE-2026-32750 SiYuan importStdMd: unvalidated localPath imports arbitrary host directories as persistent notes — siyuan 6.8 Medium2026-03-19
CVE-2026-32747 SiYuan: Incomplete sensitive path blocklist in globalCopyFiles allows reading /proc and Docker secrets — siyuan 6.8 Medium2026-03-19
CVE-2026-25928 OpenEMR Vulnerable to Path Traversal When Zipping DICOM Folders — openemr 6.5 Medium2026-03-19
CVE-2026-32805 Romeo is vulnerable to Archive Slip due to missing checks in sanitization — romeo 8.8 -2026-03-18
CVE-2025-15031 Path Traversal Vulnerability in mlflow/mlflow — mlflow/mlflow 7.8 -2026-03-18
CVE-2026-32731 ApostropheCMS has Arbitrary File Write (Zip Slip / Path Traversal) in Import-Export Gzip Extraction — import-export 10.0 Critical2026-03-18
CVE-2026-27523 OpenClaw < 2026.2.24 - Sandbox Bind Validation Bypass via Symlink-Parent Missing-Leaf Paths — OpenClaw 6.1 Medium2026-03-18
CVE-2026-27522 OpenClaw < 2026.2.24 - Arbitrary File Read via sendAttachment and setGroupIcon Message Actions — OpenClaw 6.5 Medium2026-03-18
CVE-2026-22171 OpenClaw < 2026.2.19 - Path Traversal in Feishu Media Temporary File Naming — OpenClaw 8.2 High2026-03-18
CVE-2026-32981 Ray Dashboard <= 2.8.0 Path Traversal Leading to Local File Disclosure — Ray 7.5 High2026-03-17
CVE-2026-25770 Wazuh has Privilege Escalation to Root via Cluster Protocol File Write — wazuh 9.1 Critical2026-03-17
CVE-2026-4307 frdel/agent0ai agent-zero files.py get_abs_path path traversal — agent-zero 4.3 Medium2026-03-17
CVE-2026-4285 taoofagi easegen-admin Pdf2MdUtil.java recognizeMarkdown path traversal — easegen-admin 2.7 Low2026-03-16
CVE-2026-29522 ZwickRoell Test Data Management < 3.0.8 Path Traversal LFI — Test Data Management 7.5AIHighAI2026-03-16
CVE-2026-32262 Craft CMS has a Path Traversal Vulnerability in AssetsController — cms 8.1AIHighAI2026-03-16
CVE-2026-4233 ThingsGateway download path traversal — ThingsGateway 4.3 Medium2026-03-16
CVE-2026-4222 SSCMS download PathUtils.RemoveParentPath path traversal — SSCMS 3.8 Low2026-03-16
CVE-2026-32719 AnythingLLM has a Zip Slip Path Traversal and Code Execution via Community Hub Plugin Import — anything-llm 4.2 Medium2026-03-13
CVE-2026-32709 PX4 Autopilot MAVLink FTP Unauthenticated Path Traversal (Arbitrary File Read/Write/Delete) — PX4-Autopilot 5.4 Medium2026-03-13
CVE-2026-2493 IceWarp collaboration Directory Traversal Information Disclosure Vulnerability — IceWarp 7.5AIHighAI2026-03-13
CVE-2026-3839 Unraid Authentication Request Path Traversal Authentication Bypass Vulnerability — Unraid 9.8AICriticalAI2026-03-13
CVE-2026-3838 Unraid Update Request Path Traversal Remote Code Execution Vulnerability — Unraid 8.8AIHighAI2026-03-13
CVE-2026-31886 Dagu has a Path Traversal via `dagRunId` in Inline DAG Execution — dagu 9.1 Critical2026-03-13
CVE-2026-30915 SFTPGo improperly sanitizes placeholders in group home directories/key prefixes — sftpgo 4.3 -2026-03-13
CVE-2026-30914 SFTPGo has a Path Traversal and Permission Bypass via Path Normalization Discrepancy — sftpgo 8.1 -2026-03-13

Vulnerabilities classified as CWE-22 (对路径名的限制不恰当(路径遍历)) represent 3327 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.