CWE-22: Path Traversal
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences that can resolve to a location outside of that directory.
Yearly Trend
Top Affected Vendors
All Path Traversal CVEs (2,216)
CVE-2026-29780 is a path traversal vulnerability in eml_parser's example script that allows arbitrary file writes outside intended directories. Attack...
Mar 7, 2026This CVE describes a path traversal vulnerability in ZenTao's Committer component that allows attackers to delete arbitrary files by manipulating the ...
Feb 16, 2026A path validation vulnerability in macOS allows malicious applications to bypass directory restrictions and access sensitive user data. This affects m...
Feb 11, 2026A path validation vulnerability in Apple operating systems allows applications to access sensitive user data through improper directory path parsing. ...
Feb 11, 2026A path validation vulnerability in macOS and visionOS allows applications to bypass directory restrictions and access sensitive user data. This affect...
Feb 11, 2026A path handling vulnerability in macOS allows applications to bypass intended restrictions and access sensitive user data. This affects macOS systems ...
Feb 11, 2026A path handling vulnerability in iOS/iPadOS backup restoration allows malicious backup files to modify protected system files. This affects users who ...
Feb 11, 2026This vulnerability allows attackers to read arbitrary files on Outline servers by exploiting path traversal during JSON import. Attackers can embed se...
Feb 11, 2026The Post Slides WordPress plugin through version 1.0.1 contains a Local File Inclusion (LFI) vulnerability. Authenticated users with contributor-level...
Feb 7, 2026This vulnerability in melange allows attackers to read arbitrary files from the host system through path traversal in license file paths. Attackers wh...
Feb 4, 2026A path traversal vulnerability in Samsung Members app allows local attackers to overwrite arbitrary files within the app's data directory. This affect...
Feb 4, 2026This vulnerability in malcontent allows attackers to create symbolic links outside the intended extraction directory when scanning specially crafted t...
Jan 29, 2026A path traversal vulnerability in Zohocorp ManageEngine ADManager Plus allows attackers to access files outside the intended directory through the Use...
Jan 13, 2026A path validation vulnerability in macOS allows applications to bypass directory restrictions and access sensitive user data. This affects macOS Sonom...
Dec 12, 2025A path validation vulnerability in macOS allows applications to access sensitive user data through improper directory path parsing. This affects macOS...
Dec 12, 2025A path validation vulnerability in macOS allows applications to bypass directory restrictions and access sensitive user data. This affects macOS Ventu...
Nov 21, 2025A path validation vulnerability in macOS allows applications to bypass directory restrictions and access sensitive user data. This affects macOS Sequo...
Nov 4, 2025This vulnerability in the BlindMatrix e-Commerce WordPress plugin allows authenticated users (including contributors) to perform Local File Inclusion ...
Oct 15, 2025A path validation vulnerability in macOS allows applications to bypass directory restrictions and access sensitive user data. This affects macOS syste...
Sep 15, 2025This CVE describes a path traversal vulnerability in Android's SliceManagerTest component that allows local attackers to cause permanent denial of ser...
Sep 4, 2025This path traversal vulnerability in Fortinet FortiManager and FortiManager Cloud allows authenticated remote attackers to overwrite arbitrary files v...
Aug 12, 2025This critical vulnerability in TransformerOptimus SuperAGI allows attackers to perform path traversal attacks via the filename argument in the downloa...
Jun 19, 2025This critical path traversal vulnerability in OpenAgents allows attackers to access arbitrary files on the server by manipulating file upload paths. I...
Jun 19, 2025This critical vulnerability in Upsonic allows attackers to perform path traversal attacks by manipulating file uploads. It enables unauthorized access...
Jun 19, 2025A critical path traversal vulnerability in python-a2a's create_workflow function allows attackers to access files outside intended directories. This a...
Jun 17, 2025This vulnerability allows attackers to delete arbitrary files on HPE StoreOnce backup appliances through directory traversal techniques. It affects HP...
Jun 2, 2025This CVE describes a path handling vulnerability in Apple operating systems that could allow an app to read sensitive location information. The issue ...
Mar 31, 2025This path traversal vulnerability in Fortinet FortiWeb web application firewalls allows attackers to bypass directory restrictions and potentially exe...
Mar 11, 2025This Node.js vulnerability on Windows incorrectly handles drive names in path.join(), treating relative paths as root directory references. This allow...
Jan 28, 2025This CVE describes a path validation vulnerability in macOS that allows malicious applications to overwrite arbitrary files on the system. It affects ...
Jan 27, 2025This vulnerability allows attackers to perform directory traversal attacks through the /php/script_uploads.php component in Zenitel AlphaWeb XE. Attac...
Jan 16, 2025A path traversal vulnerability in the action_listcategories() function of Asterisk allows attackers to access files outside the intended directory. Th...
Dec 2, 2024This vulnerability in Cisco ISE allows authenticated attackers with Super Admin credentials to read or delete arbitrary files on the system. It affect...
Nov 6, 2024This vulnerability allows malicious apps to record the screen without displaying the standard recording indicator on Apple devices. It affects users o...
Sep 17, 2024Okta Verify for Windows is vulnerable to privilege escalation through DLL hijacking, allowing attackers to execute arbitrary code with elevated privil...
Aug 7, 2024This vulnerability in tripleo-ansible allows local attackers to discover sensitive configuration files through brute force directory exploration due t...
Mar 23, 2023A path traversal vulnerability in ZenTao's backup handler allows attackers to delete arbitrary files by manipulating the fileName parameter. This affe...
Feb 16, 2026This CVE describes a path traversal vulnerability in JavaMall's MinioController delete function that allows attackers to delete arbitrary files on the...
Jan 5, 2026This CVE describes a path traversal vulnerability in baowzh hfly's admin interface that allows remote attackers to delete arbitrary files by manipulat...
Dec 11, 2025This vulnerability in Synology FileStation's thumb.cgi component allows authenticated users to read and write image files they shouldn't have access t...
Dec 4, 2025This CVE describes a path traversal vulnerability in RainyGao DocSys up to version 2.02.36. Attackers can remotely manipulate the 'path' parameter in ...
Oct 12, 2025This CVE describes a path traversal vulnerability in 299ko CMS versions up to 2.0.0. Attackers can remotely exploit the getSentDir/delete function in ...
Sep 10, 2025This CVE describes a path traversal vulnerability in SimStudioAI sim software where manipulation of the filePath argument allows attackers to access f...
Sep 1, 2025This CVE describes a path traversal vulnerability in yeqifu carRental software that allows remote attackers to delete arbitrary files on the server. T...
Aug 29, 2025This critical vulnerability in litemall allows attackers to perform path traversal attacks via the delete function in the file handler component. Remo...
Aug 9, 2025This critical vulnerability in gorobbs allows remote attackers to perform path traversal attacks via the filename parameter in the ResetUserAvatar API...
Jul 11, 2025This critical path traversal vulnerability in risesoft-y9 Digital-Infrastructure allows attackers to delete arbitrary files on the server by manipulat...
Jul 7, 2025This vulnerability allows authenticated attackers to write arbitrary files on the system via path traversal in Erxes's GraphQL API. It affects all Erx...
Jun 10, 2025This critical path traversal vulnerability in Kingdee Cloud Galaxy Private Cloud BBC System allows attackers to delete arbitrary files by manipulating...
May 21, 2025A path traversal vulnerability in SourceCodester Student Result Management System 1.0 allows attackers to access arbitrary files on the server by mani...
May 15, 2025About Path Traversal (CWE-22)
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences that can resolve to a location outside of that directory.
Our database tracks 2,216 CVEs classified as CWE-22, with 531 rated critical and 1,138 rated high severity. The average CVSS score for Path Traversal vulnerabilities is 7.7.
External reference: View CWE-22 on MITRE CWE →
Monitor Path Traversal Vulnerabilities
Get alerted when new Path Traversal CVEs affect your infrastructure.
Start Monitoring Free