Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 05 Mar 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:thecontrolgroup:voyager:1.8.0:*:*:*:*:laravel:*:* |
Thu, 12 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Feb 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Thecontrolgroup
Thecontrolgroup voyager |
|
| Vendors & Products |
Thecontrolgroup
Thecontrolgroup voyager |
Wed, 11 Feb 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Voyager 1.3.0 contains a directory traversal vulnerability that allows attackers to access sensitive system files by manipulating the asset path parameter. Attackers can exploit the path parameter in /admin/voyager-assets to read arbitrary files like /etc/passwd and .env configuration files. | |
| Title | Voyager 1.3.0 - Directory Traversal | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-07T14:05:23.902Z
Reserved: 2026-02-10T19:03:15.861Z
Link: CVE-2020-37214
Updated: 2026-02-12T15:45:15.671Z
Status : Deferred
Published: 2026-02-11T21:16:17.170
Modified: 2026-04-15T00:35:42.020
Link: CVE-2020-37214
No data.
OpenCVE Enrichment
Updated: 2026-02-12T10:00:53Z