| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-533q-w4g6-5586 | PsiTransfer: Upload PATCH path traversal can create `config.<NODE_ENV>.js` and lead to code execution on restart |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 27 Apr 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Psi-4ward
Psi-4ward psitransfer |
|
| Vendors & Products |
Psi-4ward
Psi-4ward psitransfer |
Thu, 23 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 23 Apr 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PsiTransfer is an open source, self-hosted file sharing solution. Prior to version 2.4.3, the upload PATCH flow under `/files/:uploadId` validates the mounted request path using the still-encoded `req.path`, but the downstream tus handler later writes using the decoded `req.params.uploadId`. In deployments that use a supported custom `PSITRANSFER_UPLOAD_DIR` whose basename prefixes a startup-loaded JavaScript path, such as `conf`, an unauthenticated attacker can create `config.<NODE_ENV>.js` in the application root. The attacker-controlled file is then executed on the next process restart. Version 2.4.3 contains a patch. | |
| Title | PsiTransfer: Upload PATCH path traversal can create `config.<NODE_ENV>.js` and lead to code execution on restart | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-23T13:59:14.836Z
Reserved: 2026-04-17T16:34:45.526Z
Link: CVE-2026-41180
Updated: 2026-04-23T13:59:11.539Z
Status : Deferred
Published: 2026-04-23T02:16:15.977
Modified: 2026-04-29T21:08:02.250
Link: CVE-2026-41180
No data.
OpenCVE Enrichment
Updated: 2026-04-28T20:45:16Z
Github GHSA