Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 14 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 14 May 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Pode is a Cross-Platform PowerShell web framework for creating REST APIs, Web Sites, and TCP/SMTP servers. From 2.4.0, to before 2.13.0, when requesting content from a Static Route, it was possible to request paths such as http://localhost:8080/c:/Windows/System32/drivers/etc/hosts and have the contents returned. This vulnerability is fixed in 2.13.0. | |
| Title | Pode: Directory Traversal is possible on Static Routes | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV4_0
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-14T18:40:09.876Z
Reserved: 2026-04-29T00:31:15.725Z
Link: CVE-2026-42598
Updated: 2026-05-14T18:40:03.705Z
Status : Deferred
Published: 2026-05-14T18:16:48.313
Modified: 2026-05-14T18:27:25.110
Link: CVE-2026-42598
No data.
OpenCVE Enrichment
Updated: 2026-05-14T19:30:26Z