CVE-2026-25059: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in OpenListTeam OpenList
OpenList Frontend is a UI component for OpenList. Prior to 4.1.10, the application contains path traversal vulnerability in multiple file operation handlers in server/handles/fsmanage.go. Filename components in req.Names are directly concatenated with validated directories using stdpath.Join. This allows ".." sequences to bypass path restrictions, enabling users to access other users' files within the same storage mount and perform unauthorized actions such as deletion, renaming, or copying of files. An authenticated attacker can bypass directory-level authorisation by injecting traversal sequences into filename components, enabling unauthorised file removal and copying across user boundaries within the same storage mount. This vulnerability is fixed in 4.1.10.
AI Analysis
Technical Summary
CVE-2026-25059 is a path traversal vulnerability classified under CWE-22, found in the OpenList Frontend component of the OpenList product by OpenListTeam. The flaw exists in multiple file operation handlers within the server-side code (server/handles/fsmanage.go), where filename components provided in the request (req.Names) are concatenated with validated directory paths using the standard path join function (stdpath.Join). However, this concatenation does not properly sanitize or normalize the input, allowing attackers to include directory traversal sequences ('..') that bypass directory-level restrictions. As a result, an authenticated attacker can manipulate file paths to access, delete, rename, or copy files belonging to other users within the same storage mount. This breaks the intended authorization boundaries and compromises file system integrity. The vulnerability has a CVSS 3.1 score of 8.8, indicating high severity, with network attack vector, low attack complexity, requiring privileges (authenticated user), no user interaction, and impacts confidentiality, integrity, and availability. The issue was resolved in OpenList version 4.1.10 by properly validating and sanitizing filename inputs to prevent traversal sequences from escaping restricted directories.
Potential Impact
For European organizations using OpenList versions prior to 4.1.10, this vulnerability poses significant risks. Unauthorized file access and manipulation can lead to data breaches, loss of sensitive information, and disruption of services relying on file integrity. Since the vulnerability allows attackers to delete or rename files, it can cause denial of service conditions or data loss. Confidentiality is compromised as attackers can access files of other users, potentially exposing personal or business-critical data. Integrity is affected by unauthorized modifications, and availability is threatened by deletion or corruption of files. Organizations in sectors with strict data protection regulations, such as GDPR, face legal and compliance risks if exploited. The requirement for authentication limits exposure but insider threats or compromised credentials can still lead to exploitation. The lack of known exploits in the wild currently reduces immediate risk but patching is critical to prevent future attacks.
Mitigation Recommendations
European organizations should immediately upgrade OpenList to version 4.1.10 or later, where the vulnerability is fixed. Until patching is possible, implement strict access controls and monitoring on OpenList storage mounts to detect unusual file operations. Employ application-layer firewalls or runtime application self-protection (RASP) tools to detect and block path traversal patterns in requests. Conduct thorough audits of user permissions and review authentication mechanisms to reduce risk from compromised accounts. Implement logging and alerting for file operations that involve deletion, renaming, or copying across user boundaries. Educate users about credential security to prevent unauthorized access. Additionally, consider isolating storage mounts per user or group to limit the blast radius of potential exploitation. Regularly review and test the application for similar input validation issues to prevent recurrence.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2026-25059: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in OpenListTeam OpenList
Description
OpenList Frontend is a UI component for OpenList. Prior to 4.1.10, the application contains path traversal vulnerability in multiple file operation handlers in server/handles/fsmanage.go. Filename components in req.Names are directly concatenated with validated directories using stdpath.Join. This allows ".." sequences to bypass path restrictions, enabling users to access other users' files within the same storage mount and perform unauthorized actions such as deletion, renaming, or copying of files. An authenticated attacker can bypass directory-level authorisation by injecting traversal sequences into filename components, enabling unauthorised file removal and copying across user boundaries within the same storage mount. This vulnerability is fixed in 4.1.10.
AI-Powered Analysis
Technical Analysis
CVE-2026-25059 is a path traversal vulnerability classified under CWE-22, found in the OpenList Frontend component of the OpenList product by OpenListTeam. The flaw exists in multiple file operation handlers within the server-side code (server/handles/fsmanage.go), where filename components provided in the request (req.Names) are concatenated with validated directory paths using the standard path join function (stdpath.Join). However, this concatenation does not properly sanitize or normalize the input, allowing attackers to include directory traversal sequences ('..') that bypass directory-level restrictions. As a result, an authenticated attacker can manipulate file paths to access, delete, rename, or copy files belonging to other users within the same storage mount. This breaks the intended authorization boundaries and compromises file system integrity. The vulnerability has a CVSS 3.1 score of 8.8, indicating high severity, with network attack vector, low attack complexity, requiring privileges (authenticated user), no user interaction, and impacts confidentiality, integrity, and availability. The issue was resolved in OpenList version 4.1.10 by properly validating and sanitizing filename inputs to prevent traversal sequences from escaping restricted directories.
Potential Impact
For European organizations using OpenList versions prior to 4.1.10, this vulnerability poses significant risks. Unauthorized file access and manipulation can lead to data breaches, loss of sensitive information, and disruption of services relying on file integrity. Since the vulnerability allows attackers to delete or rename files, it can cause denial of service conditions or data loss. Confidentiality is compromised as attackers can access files of other users, potentially exposing personal or business-critical data. Integrity is affected by unauthorized modifications, and availability is threatened by deletion or corruption of files. Organizations in sectors with strict data protection regulations, such as GDPR, face legal and compliance risks if exploited. The requirement for authentication limits exposure but insider threats or compromised credentials can still lead to exploitation. The lack of known exploits in the wild currently reduces immediate risk but patching is critical to prevent future attacks.
Mitigation Recommendations
European organizations should immediately upgrade OpenList to version 4.1.10 or later, where the vulnerability is fixed. Until patching is possible, implement strict access controls and monitoring on OpenList storage mounts to detect unusual file operations. Employ application-layer firewalls or runtime application self-protection (RASP) tools to detect and block path traversal patterns in requests. Conduct thorough audits of user permissions and review authentication mechanisms to reduce risk from compromised accounts. Implement logging and alerting for file operations that involve deletion, renaming, or copying across user boundaries. Educate users about credential security to prevent unauthorized access. Additionally, consider isolating storage mounts per user or group to limit the blast radius of potential exploitation. Regularly review and test the application for similar input validation issues to prevent recurrence.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-28T14:50:47.889Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69813005f9fa50a62f63a3e9
Added to database: 2/2/2026, 11:15:17 PM
Last enriched: 2/2/2026, 11:30:11 PM
Last updated: 2/7/2026, 1:03:57 AM
Views: 19
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2071: Buffer Overflow in UTT 进取 520W
HighCVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.