CWE-22: Path Traversal
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences that can resolve to a location outside of that directory.
Yearly Trend
Top Affected Vendors
All Path Traversal CVEs (1,995)
LORIS versions before 26.0.5, 27.0.2, and 28.0.0 contain a path traversal vulnerability in the media module that allows authenticated users with suffi...
Feb 25, 2026CVE-2026-26065 is a path traversal vulnerability in calibre's PDB readers that allows attackers to write arbitrary files anywhere the user has write p...
Feb 20, 2026CVE-2026-26975 is a critical path traversal vulnerability in Music Assistant that allows unauthenticated attackers on the same network to write arbitr...
Feb 20, 2026This vulnerability allows authenticated attackers with Subscriber-level access or higher to include and execute arbitrary .html files on WordPress ser...
Feb 17, 2026This path traversal vulnerability in Alist allows authenticated attackers to bypass directory-level authorization by injecting traversal sequences int...
Feb 4, 2026OpenList Frontend versions before 4.1.10 contain a path traversal vulnerability in file operation handlers that allows authenticated attackers to bypa...
Feb 2, 2026A path traversal vulnerability in WebPros WordPress Toolkit before version 6.9.1 allows attackers to escalate privileges by manipulating WordPress dir...
Jan 22, 2026A path traversal vulnerability in DevToys allows malicious extension packages to write files outside the intended directory, potentially overwriting s...
Jan 10, 2026CVE-2025-69194 is a path traversal vulnerability in GNU Wget2's Metalink document handling that allows attackers to write files to arbitrary locations...
Jan 9, 2026This vulnerability allows authenticated administrators in MyBB 1.8.32 to bypass avatar upload restrictions and execute arbitrary code through a chaine...
Dec 22, 2025CVE-2025-66449 is an arbitrary file write vulnerability in ConvertX, a self-hosted online file converter. Authenticated users can upload files with ma...
Dec 16, 2025A Zip Slip vulnerability in iceScrum v7.54 Pro On-prem allows attackers to execute arbitrary code by uploading a specially crafted Zip file. This affe...
Dec 15, 2025The Player Leaderboard WordPress plugin contains a Local File Inclusion vulnerability that allows authenticated attackers with Contributor-level acces...
Dec 12, 2025A directory traversal vulnerability in cPanel's Team Manager API allows attackers to overwrite arbitrary files, potentially leading to privilege escal...
Dec 11, 2025CVE-2025-8110 is a path traversal vulnerability in Gogs' PutContents API that allows improper symbolic link handling, enabling authenticated attackers...
Dec 10, 2025This vulnerability allows attackers to execute files outside of restricted paths in HP System Event Utility and Omen Gaming Hub software. It affects u...
Dec 9, 2025This vulnerability in zdh_web allows authenticated users to upload arbitrary files to any location on the server due to insufficient path validation. ...
Dec 5, 2025This vulnerability allows authenticated low-privilege users to upload ZIP files containing path traversal payloads, enabling arbitrary file writes to ...
Dec 4, 2025This vulnerability allows authenticated users with account creation privileges to perform path traversal attacks when creating new users in Grav CMS. ...
Dec 1, 2025This path traversal vulnerability in Algosec Firewall Analyzer allows authenticated users to upload files to restricted directories, potentially leadi...
Nov 12, 2025This vulnerability in Dosage comic downloader allows remote attackers to write arbitrary files outside the target directory by manipulating HTTP Conte...
Nov 7, 2025This vulnerability allows attackers to upload malicious configuration files to vulnerable systems, potentially causing denial-of-service, directory tr...
Nov 6, 2025This vulnerability allows attackers to upload malicious configuration files that bypass directory traversal protections, leading to remote code execut...
Nov 6, 2025This vulnerability allows authenticated remote attackers to create arbitrary files on Netgate pfSense CE systems via a path traversal flaw in the Suri...
Nov 6, 2025This vulnerability in Cursor AI code editor allows attackers to bypass path manipulation detection by using backslashes instead of forward slashes, en...
Nov 4, 2025This CVE describes a path traversal vulnerability in Cursor AI code editor that allows attackers to bypass sensitive file protections via NTFS path qu...
Nov 4, 2025The XStore WordPress theme contains a Local File Inclusion vulnerability that allows authenticated attackers with Subscriber-level access or higher to...
Oct 15, 2025CVE-2025-9713 is a path traversal vulnerability in Ivanti Endpoint Manager (EPM) that allows remote unauthenticated attackers to achieve remote code e...
Oct 13, 2025This vulnerability allows authenticated attackers to upload arbitrary files to any writable location in Newforma Info Exchange (NIX), potentially enab...
Oct 9, 2025This vulnerability in GTONE ChangeFlow allows attackers to upload malicious files and traverse directory paths to access restricted areas. It affects ...
Oct 2, 2025A path traversal vulnerability in MarkAny SafePC Enterprise allows attackers to access server information, potentially enabling SQL injection and unre...
Oct 2, 2025This vulnerability allows authenticated attackers to perform path traversal attacks via the 'Upload-Key' header, enabling arbitrary file writes outsid...
Sep 10, 2025This vulnerability in MONAI allows path traversal attacks through malicious ZIP files. When MONAI processes compressed files using extractall(), attac...
Sep 9, 2025Harness Gitness git LFS server prior to version 3.3.0 has an arbitrary file write vulnerability due to improper path sanitization in the upload API. A...
Aug 29, 2025The Redirection for Contact Form 7 WordPress plugin has an arbitrary file deletion vulnerability that allows unauthenticated attackers to delete any f...
Aug 20, 2025The WPGYM WordPress plugin has a Local File Inclusion vulnerability that allows authenticated attackers with Subscriber-level access to include and ex...
Aug 16, 2025This path traversal vulnerability in Samsung MagicINFO 9 Server allows attackers to access files outside the intended directory, potentially leading t...
Jul 23, 2025This Local File Inclusion vulnerability in the School Management System for WordPress plugin allows authenticated attackers with Subscriber-level acce...
Jul 18, 2025A path traversal vulnerability in SINEC NMS allows attackers to write arbitrary files to restricted locations by uploading malicious ZIP archives. Thi...
Jul 8, 2025The JKDEVKIT WordPress plugin allows authenticated attackers with Subscriber-level access (or Contributor-level if WooCommerce is enabled) to delete a...
Jul 3, 2025This vulnerability allows authenticated attackers with Subscriber-level access or higher to delete arbitrary files on WordPress servers running the Ho...
Jul 2, 2025The BeeTeam368 Extensions Pro WordPress plugin contains a directory traversal vulnerability that allows authenticated attackers with Subscriber-level ...
Jun 28, 2025This vulnerability allows authenticated attackers with Contributor-level access or higher to perform Local File Inclusion attacks in the WordPress Rev...
May 10, 2025This vulnerability allows a medium-integrity user process to interfere with Thunderbird's SYSTEM-level updater by manipulating file-locking behavior. ...
Apr 29, 2025A path traversal vulnerability in the USB storage file-sharing function of HGW-BL1500HM devices allows attackers to access, modify, or delete files an...
Mar 28, 2025This vulnerability allows unauthenticated attackers to delete arbitrary files on WordPress servers using the Drag and Drop Multiple File Upload for Co...
Mar 28, 2025A path traversal vulnerability in transformeroptimus/superagi version 0.0.14 allows attackers to upload arbitrary files to any location on the server....
Mar 20, 2025This vulnerability in NI FlexLogger's usiReg component allows remote attackers to create arbitrary files via directory traversal in URI file parsing. ...
Mar 18, 2025The CS Framework WordPress plugin has an arbitrary file deletion vulnerability that allows authenticated attackers with Subscriber-level access or hig...
Mar 7, 2025This vulnerability in the Car Dealer Automotive WordPress theme allows authenticated attackers with Subscriber-level access or higher to delete arbitr...
Feb 27, 2025About Path Traversal (CWE-22)
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences that can resolve to a location outside of that directory.
Our database tracks 1,995 CVEs classified as CWE-22, with 447 rated critical and 1,009 rated high severity. The average CVSS score for Path Traversal vulnerabilities is 7.7.
External reference: View CWE-22 on MITRE CWE →
Monitor Path Traversal Vulnerabilities
Get alerted when new Path Traversal CVEs affect your infrastructure.
Start Monitoring Free