pygeoapi is a Python server implementation of the OGC API suite of standards. From version 0.23.0 to before version 0.23.3, a raw string path concatenation vulnerability in pygeoapi's STAC FileSystemProvider plugin can allow for requests to STAC collection based collections to expose directories without authentication. The issue manifests when pygeoapi is deployed without a proxy or web front end that would normalize URLs with .. values, along with a resource of type stac-collection defined in configuration. This issue has been patched in version 0.23.3.

Project Subscriptions

Vendors Products
Geopython Subscribe
Pygeoapi Subscribe
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-f6pr-83pg-ghh6 pygeoapi 0.23.x: Path Traversal in STAC FileSystemProvider
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 12 May 2026 03:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 10 May 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Geopython
Geopython pygeoapi
Vendors & Products Geopython
Geopython pygeoapi

Fri, 08 May 2026 22:45:00 +0000

Type Values Removed Values Added
Description pygeoapi is a Python server implementation of the OGC API suite of standards. From version 0.23.0 to before version 0.23.3, a raw string path concatenation vulnerability in pygeoapi's STAC FileSystemProvider plugin can allow for requests to STAC collection based collections to expose directories without authentication. The issue manifests when pygeoapi is deployed without a proxy or web front end that would normalize URLs with .. values, along with a resource of type stac-collection defined in configuration. This issue has been patched in version 0.23.3.
Title pygeoapi: Path Traversal in STAC FileSystemProvider
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-12T02:13:37.972Z

Reserved: 2026-04-26T13:26:14.515Z

Link: CVE-2026-42351

cve-icon Vulnrichment

Updated: 2026-05-12T02:13:33.929Z

cve-icon NVD

Status : Deferred

Published: 2026-05-08T23:16:38.170

Modified: 2026-05-12T16:41:36.477

Link: CVE-2026-42351

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-10T21:24:44Z

Weaknesses