Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3051: Path Traversal in DataLinkDC dinky

0
Medium
VulnerabilityCVE-2026-3051cvecve-2026-3051
Published: Tue Feb 24 2026 (02/24/2026, 01:02:11 UTC)
Source: CVE Database V5
Vendor/Project: DataLinkDC
Product: dinky

Description

A vulnerability has been found in DataLinkDC dinky up to 1.2.5. The affected element is the function getProjectDir of the file dinky-admin/src/main/java/org/dinky/utils/GitRepository.java of the component Project Name Handler. Such manipulation of the argument projectName leads to path traversal. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/03/2026, 20:26:15 UTC

Technical Analysis

CVE-2026-3051 is a path traversal vulnerability identified in the DataLinkDC dinky software, specifically affecting versions 1.2.0 through 1.2.5. The flaw resides in the getProjectDir function within the dinky-admin/src/main/java/org/dinky/utils/GitRepository.java file, part of the Project Name Handler component. This function improperly sanitizes the projectName input parameter, allowing an attacker to craft malicious input that traverses directory paths outside the intended project directory. By exploiting this, an attacker can remotely access arbitrary files on the server's filesystem, potentially reading sensitive configuration files, source code, or other critical data. The vulnerability requires no authentication or user interaction, making it easier to exploit. The vendor was notified early but has not issued any patches or advisories. The vulnerability has been publicly disclosed with exploit details, although no active exploitation in the wild has been confirmed. The CVSS 4.0 base score is 5.3, indicating a medium severity level, with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact on confidentiality, integrity, and availability is limited but non-negligible due to the potential for unauthorized data access and possible further exploitation.

Potential Impact

The path traversal vulnerability in DataLinkDC dinky can lead to unauthorized disclosure of sensitive files, including configuration files, credentials, or source code, which can facilitate further attacks such as privilege escalation or data exfiltration. Organizations running affected versions may face data breaches, intellectual property theft, or disruption of services if attackers leverage this flaw to compromise system integrity or availability. Since the vulnerability can be exploited remotely without authentication, the attack surface is broad, increasing risk especially for internet-facing deployments. The lack of vendor response and patches exacerbates the threat, as organizations must rely on workarounds or mitigations. While no active exploitation is currently reported, the public availability of exploit details raises the likelihood of future attacks. This vulnerability poses a moderate risk to confidentiality and integrity, with some potential impact on availability if attackers modify or delete critical files.

Mitigation Recommendations

Organizations should immediately audit their use of DataLinkDC dinky and identify any deployments running versions 1.2.0 through 1.2.5. In the absence of an official patch, implement strict input validation and sanitization on the projectName parameter at the application or web server level to block path traversal characters such as '../'. Employ web application firewalls (WAFs) with custom rules to detect and block path traversal attempts targeting the vulnerable endpoint. Restrict filesystem permissions of the dinky application user to the minimum necessary, preventing access to sensitive directories outside the intended project directory. Monitor logs for suspicious access patterns indicative of path traversal exploitation attempts. If feasible, isolate the dinky service in a segmented network zone to limit exposure. Engage with the vendor for updates and consider alternative tools if no remediation is forthcoming. Prepare incident response plans to quickly address potential exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-23T17:50:02.483Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699cfc3cbe58cf853bfd2f5f

Added to database: 2/24/2026, 1:17:48 AM

Last enriched: 3/3/2026, 8:26:15 PM

Last updated: 4/10/2026, 6:19:56 AM

Views: 81

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses