CVE-2026-32567: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in icopydoc YML for Yandex Market
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in icopydoc YML for Yandex Market yml-for-yandex-market allows Path Traversal.This issue affects YML for Yandex Market: from n/a through < 5.3.0.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2026-32567 affects icopydoc's YML for Yandex Market versions before 5.3.0. It is a path traversal issue where the software does not properly restrict pathname access to certain directories, potentially allowing an attacker with high privileges to disrupt availability. The CVSS vector indicates network attack vector, low attack complexity, required privileges are high, no user interaction, and a scope change with no confidentiality or integrity impact but high impact on availability.
Potential Impact
An attacker with high privileges can exploit this path traversal vulnerability to affect the availability of the affected system. There is no reported impact on confidentiality or integrity. No known exploits are currently in the wild.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Since no patch links or vendor advisories are provided, users should monitor official icopydoc communications for updates and apply any forthcoming patches promptly. Until a fix is available, restrict high-privilege access to trusted users only.
CVE-2026-32567: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in icopydoc YML for Yandex Market
Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in icopydoc YML for Yandex Market yml-for-yandex-market allows Path Traversal.This issue affects YML for Yandex Market: from n/a through < 5.3.0.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability identified as CVE-2026-32567 affects icopydoc's YML for Yandex Market versions before 5.3.0. It is a path traversal issue where the software does not properly restrict pathname access to certain directories, potentially allowing an attacker with high privileges to disrupt availability. The CVSS vector indicates network attack vector, low attack complexity, required privileges are high, no user interaction, and a scope change with no confidentiality or integrity impact but high impact on availability.
Potential Impact
An attacker with high privileges can exploit this path traversal vulnerability to affect the availability of the affected system. There is no reported impact on confidentiality or integrity. No known exploits are currently in the wild.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Since no patch links or vendor advisories are provided, users should monitor official icopydoc communications for updates and apply any forthcoming patches promptly. Until a fix is available, restrict high-privilege access to trusted users only.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2026-03-12T11:12:48.312Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69c41186f4197a8e3b6d7012
Added to database: 3/25/2026, 4:47:02 PM
Last enriched: 4/30/2026, 2:28:40 AM
Last updated: 5/10/2026, 10:31:08 AM
Views: 97
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.