Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://growi.co.jp/news/44/ |
|
| https://jvn.jp/jp/JVN38788367/ |
|
Tue, 12 May 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Growi
Growi growi |
|
| Vendors & Products |
Growi
Growi growi |
Mon, 11 May 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Path Traversal Allowing Arbitrary EJS Template Execution in GROWI |
Mon, 11 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Path traversal vulnerability exists in GROWI v7.5.0 and earlier, which may allow an attacker to execute arbitrary EJS templates on the server when an email server is running in GROWI. | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2026-05-11T12:43:07.550Z
Reserved: 2026-04-27T08:21:56.914Z
Link: CVE-2026-41951
Updated: 2026-05-11T12:43:02.844Z
Status : Deferred
Published: 2026-05-11T10:16:13.913
Modified: 2026-05-12T15:10:27.993
Link: CVE-2026-41951
No data.
OpenCVE Enrichment
Updated: 2026-05-12T09:23:19Z