Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 12 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:c4illin:convertx:*:*:*:*:*:*:*:* |
Wed, 28 Jan 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 28 Jan 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
C4illin
C4illin convertx |
|
| Vendors & Products |
C4illin
C4illin convertx |
Tue, 27 Jan 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ConvertXis a self-hosted online file converter. In versions prior to 0.17.0, the `POST /delete` endpoint uses a user-controlled `filename` value to construct a filesystem path and deletes it via `unlink` without sufficient validation. By supplying path traversal sequences (e.g., `../`), an attacker can delete arbitrary files outside the intended uploads directory, limited only by the permissions of the server process. Version 0.17.0 fixes the issue. | |
| Title | ConvertX Vulnerable to Arbitrary File Deletion via Path Traversal in `POST /delete` | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-28T15:14:23.019Z
Reserved: 2026-01-26T19:06:16.059Z
Link: CVE-2026-24741
Updated: 2026-01-28T15:14:03.848Z
Status : Analyzed
Published: 2026-01-27T22:15:56.303
Modified: 2026-02-12T21:08:24.083
Link: CVE-2026-24741
No data.
OpenCVE Enrichment
Updated: 2026-04-18T02:00:10Z