Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| http://openplc.com |
|
| https://github.com/unicorn-hyh/CVE-2026-31156 |
|
Thu, 14 May 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | OpenPLC v3 Path Injection Allows Arbitrary File Read via Command-Line Parameters |
Thu, 14 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | OpenPLC v3 Path Injection Leading to Arbitrary File Read via Command-Line Parameters | |
| Weaknesses | CWE-20 |
Thu, 14 May 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Wed, 13 May 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | OpenPLC v3 Path Injection Leading to Arbitrary File Read via Command-Line Parameters | |
| Weaknesses | CWE-20 CWE-22 |
Wed, 13 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A path injection vulnerability exists in OpenPLC v3 (2c82b0e79c53f8c1f1458eee15fec173400d6e1a) as the binary program compiled from glue_generator.cpp does not perform any validation on the file path parameters passed via the command line. The user-controlled input parameters are directly passed to the underlying file operation functions (fopen/ifstream/ofstream) for file reading and writing. An attacker can exploit this vulnerability by constructing a malicious path to read arbitrary readable files. | |
| References |
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-14T13:56:16.663Z
Reserved: 2026-03-09T00:00:00.000Z
Link: CVE-2026-31156
Updated: 2026-05-14T13:55:41.682Z
Status : Awaiting Analysis
Published: 2026-05-13T16:16:38.763
Modified: 2026-05-14T15:16:45.160
Link: CVE-2026-31156
No data.
OpenCVE Enrichment
Updated: 2026-05-14T18:15:16Z