Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24469: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in frustratedProton http-server

0
High
VulnerabilityCVE-2026-24469cvecve-2026-24469cwe-22
Published: Sat Jan 24 2026 (01/24/2026, 01:50:24 UTC)
Source: CVE Database V5
Vendor/Project: frustratedProton
Product: http-server

Description

CVE-2026-24469 is a high-severity path traversal vulnerability in frustratedProton's http-server versions 1. 0 and below. It allows unauthenticated remote attackers to read arbitrary files on the server by sending crafted HTTP GET requests with '.. /' sequences. The vulnerability arises because the server fails to sanitize user-supplied URL paths before concatenating them to the base directory, enabling traversal outside the intended root. Exploitation does not require authentication or user interaction and impacts confidentiality but not integrity or availability. No patch was available at the time of disclosure, and no known exploits have been reported in the wild. European organizations using this HTTP server in critical infrastructure or web-facing services are at risk of sensitive data exposure. Mitigation requires implementing strict input validation and path normalization to prevent directory traversal. Countries with higher adoption of this server or with strategic targets in sectors using it are more likely to be affected.

AI-Powered Analysis

AILast updated: 01/24/2026, 02:50:14 UTC

Technical Analysis

CVE-2026-24469 is a path traversal vulnerability classified under CWE-22 affecting frustratedProton's http-server versions 1.0 and earlier. The server is implemented in C++ and handles HTTP/1.1 requests. The vulnerability exists in the RequestHandler::handleRequest method, where the filename variable derived from the user-controlled URL path is concatenated directly to the files_directory base path without proper sanitization or normalization. This allows an attacker to craft malicious HTTP GET requests containing '../' sequences to traverse directories outside the intended root directory and read arbitrary files on the server's filesystem. Since the flaw does not require authentication or user interaction, it can be exploited remotely by any unauthenticated attacker with network access to the server. The vulnerability impacts confidentiality by exposing sensitive files but does not affect integrity or availability. At the time of publication, no patch or fix was available, increasing the risk for organizations relying on this software. Although no known exploits have been reported in the wild, the high CVSS score of 7.5 reflects the ease of exploitation and potential impact. The lack of input validation and path normalization is a common security oversight in web servers, making this vulnerability a critical concern for deployments of frustratedProton http-server in production environments.

Potential Impact

For European organizations, this vulnerability poses a significant risk of unauthorized disclosure of sensitive information, including configuration files, credentials, or proprietary data stored on servers running vulnerable versions of frustratedProton http-server. This can lead to further compromise if attackers gain access to sensitive internal data or credentials. Sectors such as government, finance, healthcare, and critical infrastructure that rely on this HTTP server for web services or APIs are particularly at risk. The exposure of confidential data can result in regulatory penalties under GDPR, reputational damage, and operational disruptions. Since exploitation requires only network access and no authentication, attackers can easily scan for vulnerable servers and extract data remotely. The absence of a patch at the time of disclosure means organizations must rely on compensating controls, increasing operational complexity. The vulnerability does not directly impact system integrity or availability, but the confidentiality breach alone can have severe consequences in regulated environments.

Mitigation Recommendations

European organizations should immediately audit their environments to identify any deployments of frustratedProton http-server version 1.0 or earlier. Since no official patch is available, organizations must implement strict input validation and path normalization within their HTTP server configurations or application code to sanitize URL paths and reject any requests containing directory traversal sequences such as '../'. Employing web application firewalls (WAFs) with rules to detect and block path traversal attempts can provide an additional layer of defense. Restricting file system permissions to limit the HTTP server's access to only necessary directories reduces the potential impact of successful traversal. Network segmentation and limiting exposure of vulnerable servers to untrusted networks can reduce attack surface. Monitoring HTTP logs for suspicious requests containing traversal patterns and setting up alerting mechanisms can help detect exploitation attempts. Organizations should also engage with the vendor or community to track patch releases and plan timely updates once available. Finally, consider deploying runtime application self-protection (RASP) solutions that can detect and block malicious input in real time.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-23T00:38:20.546Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6974300c4623b1157c786403

Added to database: 1/24/2026, 2:35:56 AM

Last enriched: 1/24/2026, 2:50:14 AM

Last updated: 1/24/2026, 3:46:46 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats