Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://github.com/RedHatProductSecurity/osim/pull/615 |
|
Tue, 10 Mar 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat open Security Issue Management
|
|
| CPEs | cpe:2.3:a:redhat:open_security_issue_management:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Redhat open Security Issue Management
|
Fri, 30 Jan 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat osim |
|
| Vendors & Products |
Redhat
Redhat osim |
Thu, 29 Jan 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 29 Jan 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The $uri$args concatenation in nginx configuration file present in Open Security Issue Management (OSIM) prior v2025.9.0 allows path traversal attacks via query parameters. | |
| Title | osim: Path Traversal via query parameters in Nginx configuration | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat-cnalr
Published:
Updated: 2026-01-29T16:44:01.819Z
Reserved: 2026-01-29T13:25:57.791Z
Link: CVE-2026-1616
Updated: 2026-01-29T15:56:27.067Z
Status : Analyzed
Published: 2026-01-29T14:16:13.457
Modified: 2026-03-10T17:45:05.300
Link: CVE-2026-1616
No data.
OpenCVE Enrichment
Updated: 2026-04-18T14:45:03Z