CVE-2026-42598: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Badgerati Pode
CVE-2026-42598 is a path traversal vulnerability in Badgerati's Pode framework versions from 2. 4. 0 up to but not including 2. 13. 0. This flaw allows an attacker with high privileges to request arbitrary files outside the intended static route directory by specifying absolute paths in the URL, such as accessing system files like hosts. The vulnerability has a CVSS 4. 0 base score of 6. 9, indicating medium severity. It is fixed in version 2.
AI Analysis
Technical Summary
Pode is a cross-platform PowerShell web framework used for creating REST APIs and web services. In versions 2.4.0 through 2.12.x, when serving static content, Pode did not properly restrict pathname inputs, allowing path traversal (CWE-22). This enabled an attacker with high privileges to retrieve arbitrary files on the server by crafting requests with absolute file paths. The issue was resolved in Pode 2.13.0.
Potential Impact
An attacker with high privileges can exploit this vulnerability to read arbitrary files on the server hosting Pode, potentially exposing sensitive system or application data. The vulnerability does not require user interaction and has no known exploits in the wild as of the published date.
Mitigation Recommendations
Upgrade Pode to version 2.13.0 or later, where this path traversal vulnerability is fixed. Since the vendor advisory indicates the issue is resolved in 2.13.0, applying this official fix is the recommended remediation. No other mitigation guidance is provided.
CVE-2026-42598: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Badgerati Pode
Description
CVE-2026-42598 is a path traversal vulnerability in Badgerati's Pode framework versions from 2. 4. 0 up to but not including 2. 13. 0. This flaw allows an attacker with high privileges to request arbitrary files outside the intended static route directory by specifying absolute paths in the URL, such as accessing system files like hosts. The vulnerability has a CVSS 4. 0 base score of 6. 9, indicating medium severity. It is fixed in version 2.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Pode is a cross-platform PowerShell web framework used for creating REST APIs and web services. In versions 2.4.0 through 2.12.x, when serving static content, Pode did not properly restrict pathname inputs, allowing path traversal (CWE-22). This enabled an attacker with high privileges to retrieve arbitrary files on the server by crafting requests with absolute file paths. The issue was resolved in Pode 2.13.0.
Potential Impact
An attacker with high privileges can exploit this vulnerability to read arbitrary files on the server hosting Pode, potentially exposing sensitive system or application data. The vulnerability does not require user interaction and has no known exploits in the wild as of the published date.
Mitigation Recommendations
Upgrade Pode to version 2.13.0 or later, where this path traversal vulnerability is fixed. Since the vendor advisory indicates the issue is resolved in 2.13.0, applying this official fix is the recommended remediation. No other mitigation guidance is provided.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-04-29T00:31:15.725Z
- Cvss Version
- 4.0
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 6a0612baec166c07b002345a
Added to database: 5/14/2026, 6:21:46 PM
Last enriched: 5/14/2026, 6:37:17 PM
Last updated: 5/14/2026, 8:23:06 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.