CVE-2026-25059: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in OpenListTeam OpenList
OpenList Frontend is a UI component for OpenList. Prior to 4.1.10, the application contains path traversal vulnerability in multiple file operation handlers in server/handles/fsmanage.go. Filename components in req.Names are directly concatenated with validated directories using stdpath.Join. This allows ".." sequences to bypass path restrictions, enabling users to access other users' files within the same storage mount and perform unauthorized actions such as deletion, renaming, or copying of files. An authenticated attacker can bypass directory-level authorisation by injecting traversal sequences into filename components, enabling unauthorised file removal and copying across user boundaries within the same storage mount. This vulnerability is fixed in 4.1.10.
AI Analysis
Technical Summary
CVE-2026-25059 is a path traversal vulnerability identified in OpenList, a file management UI component developed by OpenListTeam. The flaw exists in versions prior to 4.1.10 within the server-side file operation handlers implemented in server/handles/fsmanage.go. Specifically, the vulnerability stems from improper sanitization of filename components in the req.Names parameter, which are concatenated with validated directory paths using the standard library function stdpath.Join. Although the directories themselves are validated, the concatenation process does not adequately neutralize '..' sequences embedded in filename components. This oversight allows an authenticated attacker to inject path traversal sequences to escape the intended directory boundaries. Consequently, attackers can access, delete, rename, or copy files belonging to other users within the same storage mount, bypassing directory-level authorization controls. The vulnerability affects confidentiality by exposing unauthorized file access, integrity by enabling unauthorized file modifications or deletions, and availability by potentially removing critical files. The CVSS v3.1 base score is 8.8, reflecting high severity with network attack vector, low attack complexity, requiring privileges (authenticated user), no user interaction, and unchanged scope. No known exploits are currently reported in the wild. The issue is resolved in OpenList version 4.1.10, where proper path sanitization and validation prevent traversal sequences from bypassing directory restrictions.
Potential Impact
For European organizations deploying OpenList versions earlier than 4.1.10, this vulnerability poses significant risks. Unauthorized file access across user boundaries can lead to sensitive data exposure, violating GDPR and other data protection regulations. The ability to delete or rename files can disrupt business operations, cause data loss, and impact service availability. Organizations relying on OpenList for file management in multi-user environments are particularly vulnerable to insider threats or compromised accounts exploiting this flaw. The breach of confidentiality and integrity can damage organizational reputation and incur regulatory penalties. Given the network-based attack vector and low complexity, exploitation could be automated or performed by moderately skilled attackers with valid credentials. The absence of required user interaction facilitates rapid exploitation once credentials are obtained. Overall, the vulnerability threatens data security and operational continuity in European enterprises using affected OpenList versions.
Mitigation Recommendations
European organizations should immediately upgrade OpenList to version 4.1.10 or later, where this vulnerability is patched. Until patching is feasible, implement strict access controls to limit authenticated user permissions, minimizing the risk of privilege abuse. Monitor file operation logs for unusual deletion, renaming, or copying activities indicative of traversal exploitation. Employ application-layer firewalls or intrusion detection systems with custom rules to detect and block path traversal patterns in file operation requests. Conduct regular audits of file system permissions and user access rights within the storage mounts used by OpenList. Educate users on the importance of credential security to prevent unauthorized access. Additionally, consider isolating storage mounts per user or group to reduce the impact scope if traversal occurs. Finally, integrate vulnerability scanning and penetration testing focused on path traversal vectors in the software supply chain to detect similar issues proactively.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2026-25059: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in OpenListTeam OpenList
Description
OpenList Frontend is a UI component for OpenList. Prior to 4.1.10, the application contains path traversal vulnerability in multiple file operation handlers in server/handles/fsmanage.go. Filename components in req.Names are directly concatenated with validated directories using stdpath.Join. This allows ".." sequences to bypass path restrictions, enabling users to access other users' files within the same storage mount and perform unauthorized actions such as deletion, renaming, or copying of files. An authenticated attacker can bypass directory-level authorisation by injecting traversal sequences into filename components, enabling unauthorised file removal and copying across user boundaries within the same storage mount. This vulnerability is fixed in 4.1.10.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-25059 is a path traversal vulnerability identified in OpenList, a file management UI component developed by OpenListTeam. The flaw exists in versions prior to 4.1.10 within the server-side file operation handlers implemented in server/handles/fsmanage.go. Specifically, the vulnerability stems from improper sanitization of filename components in the req.Names parameter, which are concatenated with validated directory paths using the standard library function stdpath.Join. Although the directories themselves are validated, the concatenation process does not adequately neutralize '..' sequences embedded in filename components. This oversight allows an authenticated attacker to inject path traversal sequences to escape the intended directory boundaries. Consequently, attackers can access, delete, rename, or copy files belonging to other users within the same storage mount, bypassing directory-level authorization controls. The vulnerability affects confidentiality by exposing unauthorized file access, integrity by enabling unauthorized file modifications or deletions, and availability by potentially removing critical files. The CVSS v3.1 base score is 8.8, reflecting high severity with network attack vector, low attack complexity, requiring privileges (authenticated user), no user interaction, and unchanged scope. No known exploits are currently reported in the wild. The issue is resolved in OpenList version 4.1.10, where proper path sanitization and validation prevent traversal sequences from bypassing directory restrictions.
Potential Impact
For European organizations deploying OpenList versions earlier than 4.1.10, this vulnerability poses significant risks. Unauthorized file access across user boundaries can lead to sensitive data exposure, violating GDPR and other data protection regulations. The ability to delete or rename files can disrupt business operations, cause data loss, and impact service availability. Organizations relying on OpenList for file management in multi-user environments are particularly vulnerable to insider threats or compromised accounts exploiting this flaw. The breach of confidentiality and integrity can damage organizational reputation and incur regulatory penalties. Given the network-based attack vector and low complexity, exploitation could be automated or performed by moderately skilled attackers with valid credentials. The absence of required user interaction facilitates rapid exploitation once credentials are obtained. Overall, the vulnerability threatens data security and operational continuity in European enterprises using affected OpenList versions.
Mitigation Recommendations
European organizations should immediately upgrade OpenList to version 4.1.10 or later, where this vulnerability is patched. Until patching is feasible, implement strict access controls to limit authenticated user permissions, minimizing the risk of privilege abuse. Monitor file operation logs for unusual deletion, renaming, or copying activities indicative of traversal exploitation. Employ application-layer firewalls or intrusion detection systems with custom rules to detect and block path traversal patterns in file operation requests. Conduct regular audits of file system permissions and user access rights within the storage mounts used by OpenList. Educate users on the importance of credential security to prevent unauthorized access. Additionally, consider isolating storage mounts per user or group to reduce the impact scope if traversal occurs. Finally, integrate vulnerability scanning and penetration testing focused on path traversal vectors in the software supply chain to detect similar issues proactively.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-28T14:50:47.889Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69813005f9fa50a62f63a3e9
Added to database: 2/2/2026, 11:15:17 PM
Last enriched: 2/10/2026, 10:47:27 AM
Last updated: 3/23/2026, 11:28:04 PM
Views: 57
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.