Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33529: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in tobychui zoraxy

0
Low
VulnerabilityCVE-2026-33529cvecve-2026-33529cwe-22
Published: Thu Mar 26 2026 (03/26/2026, 19:26:32 UTC)
Source: CVE Database V5
Vendor/Project: tobychui
Product: zoraxy

Description

CVE-2026-33529 is a path traversal vulnerability in the tobychui zoraxy HTTP reverse proxy tool prior to version 3. 3. 2. It allows an authenticated user to write arbitrary files outside the intended configuration directory via the configuration import endpoint. This can lead to remote code execution (RCE) by placing malicious plugins. The vulnerability requires authentication and has a low CVSS score of 3. 3 due to high attack complexity and limited confidentiality and integrity impact. No known exploits are currently reported in the wild. The issue is patched in version 3. 3.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 20:00:23 UTC

Technical Analysis

Zoraxy is a general-purpose HTTP reverse proxy and forwarding tool used to manage and route HTTP traffic. Versions prior to 3.3.2 contain a path traversal vulnerability (CWE-22) in the configuration import endpoint. This vulnerability allows an authenticated user to bypass directory restrictions and write files outside the designated configuration directory. By exploiting this, an attacker can place arbitrary files, including malicious plugins, which can lead to remote code execution (RCE) on the host system. The vulnerability requires the attacker to have valid authentication credentials, and the attack complexity is high, as it involves precise manipulation of file paths and knowledge of the system. The CVSS v3.1 base score is 3.3, reflecting low confidentiality and integrity impact and no impact on availability. The vulnerability was publicly disclosed on March 26, 2026, and fixed in zoraxy version 3.3.2. No known active exploits have been reported, but the potential for RCE elevates the risk if exploited. The flaw stems from improper validation and limitation of pathname inputs, allowing directory traversal beyond the intended config directory.

Potential Impact

If exploited, this vulnerability can allow an authenticated attacker to write arbitrary files to the system, potentially leading to remote code execution by deploying malicious plugins. This compromises the integrity and confidentiality of the affected system and could allow attackers to gain persistent control or disrupt proxy operations. Although the vulnerability requires authentication and has high attack complexity, organizations using zoraxy as a critical component in their infrastructure could face significant risks, including unauthorized access, data breaches, and service manipulation. The absence of known exploits reduces immediate risk, but the potential impact on systems handling sensitive traffic or acting as security gateways is considerable.

Mitigation Recommendations

Organizations should upgrade zoraxy to version 3.3.2 or later immediately to apply the official patch. Until upgraded, restrict access to the configuration import endpoint to trusted administrators only and monitor authentication logs for suspicious activity. Implement strict access controls and network segmentation to limit exposure of the zoraxy management interface. Employ application-layer firewalls or reverse proxies to filter and validate incoming requests to the configuration endpoints. Conduct regular audits of configuration files and plugin directories to detect unauthorized changes. Additionally, enforce strong authentication mechanisms and consider multi-factor authentication to reduce the risk of credential compromise. Finally, maintain an incident response plan to quickly address any signs of exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-20T18:05:11.830Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c58caf3c064ed76fc66ff7

Added to database: 3/26/2026, 7:44:47 PM

Last enriched: 3/26/2026, 8:00:23 PM

Last updated: 3/26/2026, 8:48:09 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses