Advisory Database
  • Advisories
  • Dependency Scanning
  1. nuget
  2. ›
  3. DotVVM
  4. ›
  5. GHSA-6q65-j4jw-9cg8

GHSA-6q65-j4jw-9cg8: DotVVM allows path traversal when deployed in Debug mode

June 19, 2025

There is a path traversal vulnerability in any DotVVM application started in Debug mode, if at least one resource with the FileResourceLocation has been added. The vulnerability allows an attacker to read arbitrary files from the filesystem accessible by the web application (i.e. appsettings.json or other files containing secrets).

References

  • github.com/advisories/GHSA-6q65-j4jw-9cg8
  • github.com/riganti/dotvvm
  • github.com/riganti/dotvvm/commit/68db0110beeda4e8e4be1b7c4e480ef876895bb5
  • github.com/riganti/dotvvm/security/advisories/GHSA-6q65-j4jw-9cg8

Code Behaviors & Features

Detect and mitigate GHSA-6q65-j4jw-9cg8 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 4.2.10, all versions starting from 4.3.0-preview01-final before 4.3.8, all versions starting from 5.0.0-preview01-final before 5.0.0-preview03-final

Fixed versions

  • 4.3.8
  • 5.0.0-preview03-final
  • 4.2.10

Solution

Upgrade to versions 4.2.10, 4.3.8, 5.0.0-preview03-final or above.

Impact 7.5 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Source file

nuget/DotVVM/GHSA-6q65-j4jw-9cg8.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 19 Aug 2025 12:19:05 +0000.