Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-9fv2-c7v6-p45w | Fonoster is vulnerable to directory traversal |
Fri, 06 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 06 Mar 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fonoster
Fonoster fonoster |
|
| Vendors & Products |
Fonoster
Fonoster fonoster |
Thu, 05 Mar 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Fonoster 0.5.5 before 0.6.1 allows ../ directory traversal to read arbitrary files via the /sounds/:file or /tts/:file VoiceServer endpoint. This occurs in serveFiles in mods/voice/src/utils.ts. NOTE: serveFiles exists in 0.5.5 but not in the next release, 0.6.1. | |
| Weaknesses | CWE-24 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-03-06T18:20:33.640Z
Reserved: 2024-08-05T00:00:00.000Z
Link: CVE-2024-43035
Updated: 2026-03-06T18:20:30.388Z
Status : Deferred
Published: 2026-03-05T20:16:09.880
Modified: 2026-04-27T19:18:46.690
Link: CVE-2024-43035
No data.
OpenCVE Enrichment
Updated: 2026-03-06T15:18:16Z
Github GHSA