Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25059: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in OpenListTeam OpenList

0
High
VulnerabilityCVE-2026-25059cvecve-2026-25059cwe-22
Published: Mon Feb 02 2026 (02/02/2026, 22:24:40 UTC)
Source: CVE Database V5
Vendor/Project: OpenListTeam
Product: OpenList

Description

OpenList Frontend is a UI component for OpenList. Prior to 4.1.10, the application contains path traversal vulnerability in multiple file operation handlers in server/handles/fsmanage.go. Filename components in req.Names are directly concatenated with validated directories using stdpath.Join. This allows ".." sequences to bypass path restrictions, enabling users to access other users' files within the same storage mount and perform unauthorized actions such as deletion, renaming, or copying of files. An authenticated attacker can bypass directory-level authorisation by injecting traversal sequences into filename components, enabling unauthorised file removal and copying across user boundaries within the same storage mount. This vulnerability is fixed in 4.1.10.

AI-Powered Analysis

AILast updated: 02/02/2026, 23:30:11 UTC

Technical Analysis

CVE-2026-25059 is a path traversal vulnerability classified under CWE-22, found in the OpenList Frontend component of the OpenList product by OpenListTeam. The flaw exists in multiple file operation handlers within the server-side code (server/handles/fsmanage.go), where filename components provided in the request (req.Names) are concatenated with validated directory paths using the standard path join function (stdpath.Join). However, this concatenation does not properly sanitize or normalize the input, allowing attackers to include directory traversal sequences ('..') that bypass directory-level restrictions. As a result, an authenticated attacker can manipulate file paths to access, delete, rename, or copy files belonging to other users within the same storage mount. This breaks the intended authorization boundaries and compromises file system integrity. The vulnerability has a CVSS 3.1 score of 8.8, indicating high severity, with network attack vector, low attack complexity, requiring privileges (authenticated user), no user interaction, and impacts confidentiality, integrity, and availability. The issue was resolved in OpenList version 4.1.10 by properly validating and sanitizing filename inputs to prevent traversal sequences from escaping restricted directories.

Potential Impact

For European organizations using OpenList versions prior to 4.1.10, this vulnerability poses significant risks. Unauthorized file access and manipulation can lead to data breaches, loss of sensitive information, and disruption of services relying on file integrity. Since the vulnerability allows attackers to delete or rename files, it can cause denial of service conditions or data loss. Confidentiality is compromised as attackers can access files of other users, potentially exposing personal or business-critical data. Integrity is affected by unauthorized modifications, and availability is threatened by deletion or corruption of files. Organizations in sectors with strict data protection regulations, such as GDPR, face legal and compliance risks if exploited. The requirement for authentication limits exposure but insider threats or compromised credentials can still lead to exploitation. The lack of known exploits in the wild currently reduces immediate risk but patching is critical to prevent future attacks.

Mitigation Recommendations

European organizations should immediately upgrade OpenList to version 4.1.10 or later, where the vulnerability is fixed. Until patching is possible, implement strict access controls and monitoring on OpenList storage mounts to detect unusual file operations. Employ application-layer firewalls or runtime application self-protection (RASP) tools to detect and block path traversal patterns in requests. Conduct thorough audits of user permissions and review authentication mechanisms to reduce risk from compromised accounts. Implement logging and alerting for file operations that involve deletion, renaming, or copying across user boundaries. Educate users about credential security to prevent unauthorized access. Additionally, consider isolating storage mounts per user or group to limit the blast radius of potential exploitation. Regularly review and test the application for similar input validation issues to prevent recurrence.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-28T14:50:47.889Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69813005f9fa50a62f63a3e9

Added to database: 2/2/2026, 11:15:17 PM

Last enriched: 2/2/2026, 11:30:11 PM

Last updated: 2/7/2026, 1:03:57 AM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats