GHSA-RPQR-J937-6QR9
Vulnerability from github – Published: 2026-03-03 15:31 – Updated: 2026-03-04 20:25
VLAI?
Summary
OpenViking contains a Path Traversal vulnerability
Details
OpenViking versions 0.2.1 and prior, fixed in commit 46b3e76, contain a path traversal vulnerability in the .ovpack import handling that allows attackers to write files outside the intended import directory. Attackers can craft malicious ZIP archives with traversal sequences, absolute paths, or drive prefixes in member names to overwrite or create arbitrary files with the importing process privileges.
Severity ?
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "openviking"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "0.2.1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2026-28518"
],
"database_specific": {
"cwe_ids": [
"CWE-22"
],
"github_reviewed": true,
"github_reviewed_at": "2026-03-04T20:25:40Z",
"nvd_published_at": "2026-03-03T15:16:20Z",
"severity": "HIGH"
},
"details": "OpenViking versions 0.2.1 and prior, fixed in commit\u00a046b3e76, contain a path traversal vulnerability in the .ovpack import handling that allows attackers to write files outside the intended import directory. Attackers can craft malicious ZIP archives with traversal sequences, absolute paths, or drive prefixes in member names to overwrite or create arbitrary files with the importing process privileges.",
"id": "GHSA-rpqr-j937-6qr9",
"modified": "2026-03-04T20:25:40Z",
"published": "2026-03-03T15:31:41Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-28518"
},
{
"type": "WEB",
"url": "https://github.com/volcengine/OpenViking/issues/342"
},
{
"type": "WEB",
"url": "https://github.com/volcengine/OpenViking/commit/46b3e76e28b9b3eee73693720c9ec48820228b72"
},
{
"type": "PACKAGE",
"url": "https://github.com/volcengine/OpenViking"
},
{
"type": "WEB",
"url": "https://www.vulncheck.com/advisories/openviking-ovpack-import-zip-slip-path-traversal"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"type": "CVSS_V4"
}
],
"summary": "OpenViking contains a Path Traversal vulnerability"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…