The wisp.serve_static function is vulnerable to path traversal because sanitization runs before percent-decoding. The encoded sequence %2e%2e passes through string.replace unchanged, then uri.percent_decode converts it to .., which the OS resolves as directory traversal when the file is read.
An unauthenticated attacker can read any file readable by the application process in a single HTTP request, including application source code, configuration files, secrets, and system files.
This issue affects wisp: from 2.1.1 before 2.2.1.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-h7cj-j2vv-qw8r | Wisp Vulnerable to Path Traversal |
Mon, 06 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 11 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 10 Mar 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in gleam-wisp wisp allows arbitrary file read via percent-encoded path traversal. The wisp.serve_static function is vulnerable to path traversal because sanitization runs before percent-decoding. The encoded sequence %2e%2e passes through string.replace unchanged, then uri.percent_decode converts it to .., which the OS resolves as directory traversal when the file is read. An unauthenticated attacker can read any file readable by the application process in a single HTTP request, including application source code, configuration files, secrets, and system files. This issue affects wisp: from 2.1.1 before 2.2.1. | |
| Title | Path Traversal in wisp.serve_static allows arbitrary file read | |
| First Time appeared |
Gleam-wisp
Gleam-wisp wisp |
|
| Weaknesses | CWE-22 | |
| CPEs | cpe:2.3:a:gleam-wisp:wisp:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Gleam-wisp
Gleam-wisp wisp |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: EEF
Published:
Updated: 2026-04-06T16:44:07.589Z
Reserved: 2026-03-03T14:40:00.590Z
Link: CVE-2026-28807
Updated: 2026-03-11T14:20:53.092Z
Status : Awaiting Analysis
Published: 2026-03-10T22:16:18.640
Modified: 2026-04-06T17:17:09.200
Link: CVE-2026-28807
No data.
OpenCVE Enrichment
Updated: 2026-04-15T22:45:16Z
Github GHSA