Логотип exploitDog
bind:CVE-2026-25228
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-25228

Количество 2

Количество 2

nvd логотип

CVE-2026-25228

6 дней назад

Signal K Server is a server application that runs on a central hub in a boat. Prior to 2.20.3, a path traversal vulnerability in SignalK Server's applicationData API allows authenticated users on Windows systems to read, write, and list arbitrary files and directories on the filesystem. The validateAppId() function blocks forward slashes (/) but not backslashes (\), which are treated as directory separators by path.join() on Windows. This enables attackers to escape the intended applicationData directory. This vulnerability is fixed in 2.20.3.

CVSS3: 5
EPSS: Низкий
github логотип

GHSA-vrhw-v2hw-jffx

6 дней назад

SignalK Server has Path Traversal leading to information disclosure

CVSS3: 5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2026-25228

Signal K Server is a server application that runs on a central hub in a boat. Prior to 2.20.3, a path traversal vulnerability in SignalK Server's applicationData API allows authenticated users on Windows systems to read, write, and list arbitrary files and directories on the filesystem. The validateAppId() function blocks forward slashes (/) but not backslashes (\), which are treated as directory separators by path.join() on Windows. This enables attackers to escape the intended applicationData directory. This vulnerability is fixed in 2.20.3.

CVSS3: 5
0%
Низкий
6 дней назад
github логотип
GHSA-vrhw-v2hw-jffx

SignalK Server has Path Traversal leading to information disclosure

CVSS3: 5
0%
Низкий
6 дней назад

Уязвимостей на страницу