Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25059: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in OpenListTeam OpenList

0
High
VulnerabilityCVE-2026-25059cvecve-2026-25059cwe-22
Published: Mon Feb 02 2026 (02/02/2026, 22:24:40 UTC)
Source: CVE Database V5
Vendor/Project: OpenListTeam
Product: OpenList

Description

OpenList Frontend is a UI component for OpenList. Prior to 4.1.10, the application contains path traversal vulnerability in multiple file operation handlers in server/handles/fsmanage.go. Filename components in req.Names are directly concatenated with validated directories using stdpath.Join. This allows ".." sequences to bypass path restrictions, enabling users to access other users' files within the same storage mount and perform unauthorized actions such as deletion, renaming, or copying of files. An authenticated attacker can bypass directory-level authorisation by injecting traversal sequences into filename components, enabling unauthorised file removal and copying across user boundaries within the same storage mount. This vulnerability is fixed in 4.1.10.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/10/2026, 10:47:27 UTC

Technical Analysis

CVE-2026-25059 is a path traversal vulnerability identified in OpenList, a file management UI component developed by OpenListTeam. The flaw exists in versions prior to 4.1.10 within the server-side file operation handlers implemented in server/handles/fsmanage.go. Specifically, the vulnerability stems from improper sanitization of filename components in the req.Names parameter, which are concatenated with validated directory paths using the standard library function stdpath.Join. Although the directories themselves are validated, the concatenation process does not adequately neutralize '..' sequences embedded in filename components. This oversight allows an authenticated attacker to inject path traversal sequences to escape the intended directory boundaries. Consequently, attackers can access, delete, rename, or copy files belonging to other users within the same storage mount, bypassing directory-level authorization controls. The vulnerability affects confidentiality by exposing unauthorized file access, integrity by enabling unauthorized file modifications or deletions, and availability by potentially removing critical files. The CVSS v3.1 base score is 8.8, reflecting high severity with network attack vector, low attack complexity, requiring privileges (authenticated user), no user interaction, and unchanged scope. No known exploits are currently reported in the wild. The issue is resolved in OpenList version 4.1.10, where proper path sanitization and validation prevent traversal sequences from bypassing directory restrictions.

Potential Impact

For European organizations deploying OpenList versions earlier than 4.1.10, this vulnerability poses significant risks. Unauthorized file access across user boundaries can lead to sensitive data exposure, violating GDPR and other data protection regulations. The ability to delete or rename files can disrupt business operations, cause data loss, and impact service availability. Organizations relying on OpenList for file management in multi-user environments are particularly vulnerable to insider threats or compromised accounts exploiting this flaw. The breach of confidentiality and integrity can damage organizational reputation and incur regulatory penalties. Given the network-based attack vector and low complexity, exploitation could be automated or performed by moderately skilled attackers with valid credentials. The absence of required user interaction facilitates rapid exploitation once credentials are obtained. Overall, the vulnerability threatens data security and operational continuity in European enterprises using affected OpenList versions.

Mitigation Recommendations

European organizations should immediately upgrade OpenList to version 4.1.10 or later, where this vulnerability is patched. Until patching is feasible, implement strict access controls to limit authenticated user permissions, minimizing the risk of privilege abuse. Monitor file operation logs for unusual deletion, renaming, or copying activities indicative of traversal exploitation. Employ application-layer firewalls or intrusion detection systems with custom rules to detect and block path traversal patterns in file operation requests. Conduct regular audits of file system permissions and user access rights within the storage mounts used by OpenList. Educate users on the importance of credential security to prevent unauthorized access. Additionally, consider isolating storage mounts per user or group to reduce the impact scope if traversal occurs. Finally, integrate vulnerability scanning and penetration testing focused on path traversal vectors in the software supply chain to detect similar issues proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-28T14:50:47.889Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69813005f9fa50a62f63a3e9

Added to database: 2/2/2026, 11:15:17 PM

Last enriched: 2/10/2026, 10:47:27 AM

Last updated: 3/23/2026, 11:28:04 PM

Views: 57

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses