Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
No reference.
Thu, 22 Jan 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | TestLink versions 1.16 through 1.19 contain an unauthenticated file download vulnerability in the attachmentdownload.php endpoint. Attackers can download arbitrary files by iterating file IDs through the 'id' parameter with 'skipCheck=1' to bypass access controls. | This CVE ID has been rejected or withdrawn by its CVE Numbering Authority as a duplicate. |
| Title | TestLink 1.19 - Arbitrary File Download (Unauthenticated) | |
| Weaknesses | CWE-639 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Fri, 16 Jan 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Testlink
Testlink testlink |
|
| Vendors & Products |
Testlink
Testlink testlink |
Thu, 15 Jan 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 15 Jan 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | TestLink versions 1.16 through 1.19 contain an unauthenticated file download vulnerability in the attachmentdownload.php endpoint. Attackers can download arbitrary files by iterating file IDs through the 'id' parameter with 'skipCheck=1' to bypass access controls. | |
| Title | TestLink 1.19 - Arbitrary File Download (Unauthenticated) | |
| Weaknesses | CWE-639 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: REJECTED
Assigner: VulnCheck
Published:
Updated: 2026-01-22T20:42:51.435Z
Reserved: 2026-01-14T14:39:44.734Z
Link: CVE-2021-47760
Updated:
Status : Rejected
Published: 2026-01-15T16:16:06.993
Modified: 2026-01-22T21:15:48.850
Link: CVE-2021-47760
No data.
OpenCVE Enrichment
Updated: 2026-01-16T13:43:44Z
No weakness.