| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-f6pr-83pg-ghh6 | pygeoapi 0.23.x: Path Traversal in STAC FileSystemProvider |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 12 May 2026 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 10 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Geopython
Geopython pygeoapi |
|
| Vendors & Products |
Geopython
Geopython pygeoapi |
Fri, 08 May 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | pygeoapi is a Python server implementation of the OGC API suite of standards. From version 0.23.0 to before version 0.23.3, a raw string path concatenation vulnerability in pygeoapi's STAC FileSystemProvider plugin can allow for requests to STAC collection based collections to expose directories without authentication. The issue manifests when pygeoapi is deployed without a proxy or web front end that would normalize URLs with .. values, along with a resource of type stac-collection defined in configuration. This issue has been patched in version 0.23.3. | |
| Title | pygeoapi: Path Traversal in STAC FileSystemProvider | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-12T02:13:37.972Z
Reserved: 2026-04-26T13:26:14.515Z
Link: CVE-2026-42351
Updated: 2026-05-12T02:13:33.929Z
Status : Deferred
Published: 2026-05-08T23:16:38.170
Modified: 2026-05-12T16:41:36.477
Link: CVE-2026-42351
No data.
OpenCVE Enrichment
Updated: 2026-05-10T21:24:44Z
Github GHSA