Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-wj3h-wx8g-x699 | H2O has an External Control of File Name or Path vulnerability |
Wed, 04 Feb 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
H2oai
H2oai h2o-3 |
|
| Vendors & Products |
H2oai
H2oai h2o-3 |
Mon, 02 Feb 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 02 Feb 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in h2oai/h2o-3 version 3.46.0.1 allows remote attackers to write arbitrary data to any file on the server. This is achieved by exploiting the `/3/Parse` endpoint to inject attacker-controlled data as the header of an empty file, which is then exported using the `/3/Frames/framename/export` endpoint. The impact of this vulnerability includes the potential for remote code execution and complete access to the system running h2o-3, as attackers can overwrite critical files such as private SSH keys or script files. | |
| Title | Remote Arbitrary File Write with Arbitrary Data in h2oai/h2o-3 | |
| Weaknesses | CWE-73 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2026-02-02T13:13:23.762Z
Reserved: 2024-06-13T18:37:40.863Z
Link: CVE-2024-5986
Updated: 2026-02-02T12:52:19.927Z
Status : Deferred
Published: 2026-02-02T11:16:16.737
Modified: 2026-04-15T14:34:27.800
Link: CVE-2024-5986
No data.
OpenCVE Enrichment
Updated: 2026-02-04T12:45:04Z
Github GHSA