CVE-2026-33529: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in tobychui zoraxy
CVE-2026-33529 is a path traversal vulnerability in the tobychui zoraxy HTTP reverse proxy tool prior to version 3. 3. 2. It allows an authenticated user to write arbitrary files outside the intended configuration directory via the configuration import endpoint. This can lead to remote code execution (RCE) by placing malicious plugins. The vulnerability requires authentication and has a low CVSS score of 3. 3 due to high attack complexity and limited confidentiality and integrity impact. No known exploits are currently reported in the wild. The issue is patched in version 3. 3.
AI Analysis
Technical Summary
Zoraxy is a general-purpose HTTP reverse proxy and forwarding tool used to manage and route HTTP traffic. Versions prior to 3.3.2 contain a path traversal vulnerability (CWE-22) in the configuration import endpoint. This vulnerability allows an authenticated user to bypass directory restrictions and write files outside the designated configuration directory. By exploiting this, an attacker can place arbitrary files, including malicious plugins, which can lead to remote code execution (RCE) on the host system. The vulnerability requires the attacker to have valid authentication credentials, and the attack complexity is high, as it involves precise manipulation of file paths and knowledge of the system. The CVSS v3.1 base score is 3.3, reflecting low confidentiality and integrity impact and no impact on availability. The vulnerability was publicly disclosed on March 26, 2026, and fixed in zoraxy version 3.3.2. No known active exploits have been reported, but the potential for RCE elevates the risk if exploited. The flaw stems from improper validation and limitation of pathname inputs, allowing directory traversal beyond the intended config directory.
Potential Impact
If exploited, this vulnerability can allow an authenticated attacker to write arbitrary files to the system, potentially leading to remote code execution by deploying malicious plugins. This compromises the integrity and confidentiality of the affected system and could allow attackers to gain persistent control or disrupt proxy operations. Although the vulnerability requires authentication and has high attack complexity, organizations using zoraxy as a critical component in their infrastructure could face significant risks, including unauthorized access, data breaches, and service manipulation. The absence of known exploits reduces immediate risk, but the potential impact on systems handling sensitive traffic or acting as security gateways is considerable.
Mitigation Recommendations
Organizations should upgrade zoraxy to version 3.3.2 or later immediately to apply the official patch. Until upgraded, restrict access to the configuration import endpoint to trusted administrators only and monitor authentication logs for suspicious activity. Implement strict access controls and network segmentation to limit exposure of the zoraxy management interface. Employ application-layer firewalls or reverse proxies to filter and validate incoming requests to the configuration endpoints. Conduct regular audits of configuration files and plugin directories to detect unauthorized changes. Additionally, enforce strong authentication mechanisms and consider multi-factor authentication to reduce the risk of credential compromise. Finally, maintain an incident response plan to quickly address any signs of exploitation.
Affected Countries
United States, Germany, United Kingdom, France, Japan, South Korea, Australia, Canada, Netherlands, Singapore
CVE-2026-33529: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in tobychui zoraxy
Description
CVE-2026-33529 is a path traversal vulnerability in the tobychui zoraxy HTTP reverse proxy tool prior to version 3. 3. 2. It allows an authenticated user to write arbitrary files outside the intended configuration directory via the configuration import endpoint. This can lead to remote code execution (RCE) by placing malicious plugins. The vulnerability requires authentication and has a low CVSS score of 3. 3 due to high attack complexity and limited confidentiality and integrity impact. No known exploits are currently reported in the wild. The issue is patched in version 3. 3.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Zoraxy is a general-purpose HTTP reverse proxy and forwarding tool used to manage and route HTTP traffic. Versions prior to 3.3.2 contain a path traversal vulnerability (CWE-22) in the configuration import endpoint. This vulnerability allows an authenticated user to bypass directory restrictions and write files outside the designated configuration directory. By exploiting this, an attacker can place arbitrary files, including malicious plugins, which can lead to remote code execution (RCE) on the host system. The vulnerability requires the attacker to have valid authentication credentials, and the attack complexity is high, as it involves precise manipulation of file paths and knowledge of the system. The CVSS v3.1 base score is 3.3, reflecting low confidentiality and integrity impact and no impact on availability. The vulnerability was publicly disclosed on March 26, 2026, and fixed in zoraxy version 3.3.2. No known active exploits have been reported, but the potential for RCE elevates the risk if exploited. The flaw stems from improper validation and limitation of pathname inputs, allowing directory traversal beyond the intended config directory.
Potential Impact
If exploited, this vulnerability can allow an authenticated attacker to write arbitrary files to the system, potentially leading to remote code execution by deploying malicious plugins. This compromises the integrity and confidentiality of the affected system and could allow attackers to gain persistent control or disrupt proxy operations. Although the vulnerability requires authentication and has high attack complexity, organizations using zoraxy as a critical component in their infrastructure could face significant risks, including unauthorized access, data breaches, and service manipulation. The absence of known exploits reduces immediate risk, but the potential impact on systems handling sensitive traffic or acting as security gateways is considerable.
Mitigation Recommendations
Organizations should upgrade zoraxy to version 3.3.2 or later immediately to apply the official patch. Until upgraded, restrict access to the configuration import endpoint to trusted administrators only and monitor authentication logs for suspicious activity. Implement strict access controls and network segmentation to limit exposure of the zoraxy management interface. Employ application-layer firewalls or reverse proxies to filter and validate incoming requests to the configuration endpoints. Conduct regular audits of configuration files and plugin directories to detect unauthorized changes. Additionally, enforce strong authentication mechanisms and consider multi-factor authentication to reduce the risk of credential compromise. Finally, maintain an incident response plan to quickly address any signs of exploitation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-20T18:05:11.830Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c58caf3c064ed76fc66ff7
Added to database: 3/26/2026, 7:44:47 PM
Last enriched: 3/26/2026, 8:00:23 PM
Last updated: 3/26/2026, 8:48:09 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.