We found results for “”
CVE-2026-24741
Good to know:
Date: January 27, 2026
ConvertXis a self-hosted online file converter. In versions prior to 0.17.0, the "POST /delete" endpoint uses a user-controlled "filename" value to construct a filesystem path and deletes it via "unlink" without sufficient validation. By supplying path traversal sequences (e.g., "../"), an attacker can delete arbitrary files outside the intended uploads directory, limited only by the permissions of the server process. Version 0.17.0 fixes the issue.
Severity Score
Severity Score
Weakness Type (CWE)
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE-22Top Fix
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | LOW |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | NONE |
| Integrity (I): | HIGH |
| Availability (A): | HIGH |
Vulnerabilities
Projects
Contact Us


