FKIE_CVE-2026-34619

Vulnerability from fkie_nvd - Published: 2026-04-14 22:16 - Updated: 2026-04-16 14:28
Summary
ColdFusion versions 2023.18, 2025.6 and earlier are affected by an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to access unauthorized files or directories outside the intended restrictions. Exploitation of this issue does not require user interaction.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:adobe:coldfusion:2023:-:*:*:*:*:*:*",
              "matchCriteriaId": "B02A37FE-5D31-4892-A3E6-156A8FE62D28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update1:*:*:*:*:*:*",
              "matchCriteriaId": "0AA3D302-CFEE-4DFD-AB92-F53C87721BFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update10:*:*:*:*:*:*",
              "matchCriteriaId": "645D1B5F-2DAB-4AB8-A465-AC37FF494F95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update11:*:*:*:*:*:*",
              "matchCriteriaId": "ED6D8996-0770-4C9F-BEA5-87EA479D40A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update12:*:*:*:*:*:*",
              "matchCriteriaId": "4836086E-3D4A-4A07-A372-382D385CB490",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update13:*:*:*:*:*:*",
              "matchCriteriaId": "CBC19168-4184-4B59-B9C8-E98844124EED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update14:*:*:*:*:*:*",
              "matchCriteriaId": "A60DCD92-9A5B-411C-9554-642C91D77FAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update15:*:*:*:*:*:*",
              "matchCriteriaId": "58CC65EF-60A3-4DFA-AA51-E5013F116CEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update16:*:*:*:*:*:*",
              "matchCriteriaId": "2E3EBFB1-4488-4924-A2E2-B7E422D68345",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update17:*:*:*:*:*:*",
              "matchCriteriaId": "A683F9B2-A0DC-4AA0-BE97-9E74FA200AB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update18:*:*:*:*:*:*",
              "matchCriteriaId": "8689F35F-9A81-45D2-B782-DBA12306BA45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update2:*:*:*:*:*:*",
              "matchCriteriaId": "EB88D4FE-5496-4639-BAF2-9F29F24ABF29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update3:*:*:*:*:*:*",
              "matchCriteriaId": "43E0ED98-2C1F-40B8-AF60-FEB1D85619C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update4:*:*:*:*:*:*",
              "matchCriteriaId": "76204873-C6E0-4202-8A03-0773270F1802",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update5:*:*:*:*:*:*",
              "matchCriteriaId": "C1A22BE9-0D47-4BA8-8BDB-9B12D7A0F7C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update6:*:*:*:*:*:*",
              "matchCriteriaId": "E3A83642-BF14-4C37-BD94-FA76AABE8ADC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update7:*:*:*:*:*:*",
              "matchCriteriaId": "A892E1DC-F2C8-4F53-8580-A2D1BEED5A25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update8:*:*:*:*:*:*",
              "matchCriteriaId": "DB97ADBA-C1A9-4EE0-9509-68CB12358AE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update9:*:*:*:*:*:*",
              "matchCriteriaId": "E17C38F0-9B0F-4433-9CBD-6E3D63EA9BDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:coldfusion:2025:-:*:*:*:*:*:*",
              "matchCriteriaId": "30779417-D4E5-4A01-BE0E-1CE1D134292A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:coldfusion:2025:update1:*:*:*:*:*:*",
              "matchCriteriaId": "80D7FC6A-F264-4CB1-A18D-B091EBA47882",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:coldfusion:2025:update2:*:*:*:*:*:*",
              "matchCriteriaId": "E3DA0D20-93BA-4C76-A400-159853CD7277",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:coldfusion:2025:update3:*:*:*:*:*:*",
              "matchCriteriaId": "5BAB6F21-61F1-43AB-88BA-553CD9AD6C0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:coldfusion:2025:update4:*:*:*:*:*:*",
              "matchCriteriaId": "C85288B9-5D63-49EA-828A-8DB3BB2367F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:coldfusion:2025:update5:*:*:*:*:*:*",
              "matchCriteriaId": "3882A011-5A01-48E7-B5E7-5A837B1CE245",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:coldfusion:2025:update6:*:*:*:*:*:*",
              "matchCriteriaId": "AACCE621-3380-4144-BA1B-AA26FE96B902",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "ColdFusion versions 2023.18, 2025.6 and earlier are affected by an Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027) vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to access unauthorized files or directories outside the intended restrictions. Exploitation of this issue does not require user interaction."
    }
  ],
  "id": "CVE-2026-34619",
  "lastModified": "2026-04-16T14:28:33.400",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.7,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.1,
        "impactScore": 4.0,
        "source": "psirt@adobe.com",
        "type": "Primary"
      }
    ]
  },
  "published": "2026-04-14T22:16:31.680",
  "references": [
    {
      "source": "psirt@adobe.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://helpx.adobe.com/security/products/coldfusion/apsb26-38.html"
    }
  ],
  "sourceIdentifier": "psirt@adobe.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "psirt@adobe.com",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…