Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-4753-cmc8-8j9v | GoDoxy has a Path Traversal Vulnerability in its File API |
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Godoxy
Godoxy godoxy |
|
| CPEs | cpe:2.3:a:godoxy:godoxy:*:*:*:*:*:go:*:* | |
| Vendors & Products |
Godoxy
Godoxy godoxy |
Fri, 27 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 27 Mar 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Yusing
Yusing godoxy |
|
| Vendors & Products |
Yusing
Yusing godoxy |
Thu, 26 Mar 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | GoDoxy is a reverse proxy and container orchestrator for self-hosters. Prior to version 0.27.5, the file content API endpoint at `/api/v1/file/content` is vulnerable to path traversal. The `filename` query parameter is passed directly to `path.Join(common.ConfigBasePath, filename)` where `ConfigBasePath = "config"` (a relative path). No sanitization or validation is applied beyond checking that the field is non-empty (`binding:"required"`). An authenticated attacker can use `../` sequences to read or write files outside the intended `config/` directory, including TLS private keys, OAuth refresh tokens, and any file accessible to the container's UID. Version 0.27.5 fixes the issue. | |
| Title | GoDoxy has a Path Traversal Vulnerability in its File API | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-27T13:57:45.401Z
Reserved: 2026-03-20T18:05:11.830Z
Link: CVE-2026-33528
Updated: 2026-03-27T13:45:48.406Z
Status : Analyzed
Published: 2026-03-26T20:16:14.913
Modified: 2026-04-02T18:17:26.267
Link: CVE-2026-33528
No data.
OpenCVE Enrichment
Updated: 2026-04-03T09:38:53Z
Github GHSA