Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3695: Path Traversal in SourceCodester Modern Image Gallery App

0
Medium
VulnerabilityCVE-2026-3695cvecve-2026-3695
Published: Sun Mar 08 2026 (03/08/2026, 00:32:10 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Modern Image Gallery App

Description

A vulnerability has been found in SourceCodester Modern Image Gallery App 1.0. Impacted is an unknown function of the file /delete.php. Such manipulation of the argument filename leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/15/2026, 09:04:24 UTC

Technical Analysis

CVE-2026-3695 identifies a path traversal vulnerability in the SourceCodester Modern Image Gallery App version 1.0, located in the /delete.php script. The vulnerability arises from improper validation of the 'filename' parameter, which an attacker can manipulate to traverse directories and access files outside the intended directory scope. This type of vulnerability enables attackers to read arbitrary files on the server, potentially exposing sensitive information such as configuration files, credentials, or other private data. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing the risk of automated attacks. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial impact on confidentiality and availability (VC:N, VI:L, VA:L). The exploit has been publicly disclosed, raising the likelihood of exploitation attempts, although no active exploitation has been reported yet. The absence of patches or official fixes at the time of publication necessitates immediate mitigation efforts by affected organizations. This vulnerability is particularly critical for deployments exposed to the internet or untrusted networks, as attackers can remotely trigger the flaw to gain unauthorized file access.

Potential Impact

The primary impact of CVE-2026-3695 is unauthorized disclosure of sensitive files on affected servers, which can compromise confidentiality. Attackers may retrieve configuration files, credentials, or other sensitive data, potentially leading to further exploitation such as privilege escalation or lateral movement within the network. The vulnerability can also affect system integrity if attackers modify files indirectly by leveraging disclosed information. Availability impact is limited but possible if critical system files are accessed and manipulated. Organizations worldwide using the SourceCodester Modern Image Gallery App 1.0 or similar vulnerable web applications face increased risk of data breaches and reputational damage. The ease of exploitation and lack of required authentication amplify the threat, especially for internet-facing instances. Although no known exploits are currently active in the wild, public disclosure increases the risk of imminent attacks. Failure to address this vulnerability could lead to significant operational and security consequences.

Mitigation Recommendations

1. Immediate mitigation should include input validation and sanitization on the 'filename' parameter in /delete.php to prevent directory traversal sequences such as '../'. 2. Implement strict allowlists for file names or extensions that can be processed by the delete functionality. 3. Apply least privilege principles to the web server and application file system permissions to restrict access to sensitive directories and files. 4. Employ web application firewalls (WAFs) configured to detect and block path traversal attack patterns targeting the vulnerable endpoint. 5. Monitor server logs for unusual access patterns or attempts to access files outside the intended directories. 6. If possible, isolate the application in a sandboxed environment to limit the impact of potential exploitation. 7. Stay alert for official patches or updates from SourceCodester and apply them promptly once available. 8. Conduct regular security assessments and code reviews to identify and remediate similar vulnerabilities proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-07T08:36:51.712Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69acc85d2904315ca3180bd1

Added to database: 3/8/2026, 12:52:45 AM

Last enriched: 3/15/2026, 9:04:24 AM

Last updated: 4/21/2026, 9:18:49 AM

Views: 95

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses