CVE-2026-33686
Wykryto podatność na przejście ścieżki w Sharp, co może prowadzić do nieautoryzowanego dostępu do plików.
Sharp is a content management framework built for Laravel as a package. Versions prior to 9.20.0 have a path traversal vulnerability in the FileUtil class. The application fails to sanitize file extensions properly, allowing path separators to be passed into the storage layer. In `src/Utils/FileUtil.php`, the `FileUtil::explodeExtension()` function extracts a file's extension by splitting the filename at the last dot. This issue has been patched in version 9.20.0 by properly sanitizing the extension using `pathinfo(PATHINFO_EXTENSION)` instead of `strrpos()`, alongside applying strict regex replacements to both the base name and the extension.
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 8.8 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.1% |
| Opublikowano (NVD) | 2026-03-26 22:16:31 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-01 12:26:41 UTC |
- https://github.com/code16/sharp/pull/715 (security-advisories@github.com) [Issue Tracking, Patch]
- https://github.com/code16/sharp/security/advisories/GHSA-9ffq-6457-8958 (security-advisories@github.com) [Vendor Advisory]