CVE-2026-38360
Directory Traversal in fohrloop dash-uploader
Publication date: 2026-05-08
Last updated on: 2026-05-08
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| fohrloop | dash-uploader | From 0.1.0 (inc) to 0.7.0a2 (inc) |
| fohrloop | dash-uploader | to 0.7.0a2 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Directory Traversal issue found in fohrloop dash-uploader versions 0.1.0 through 0.7.0a2. It allows a remote attacker to execute arbitrary code by exploiting certain components in the software, specifically dash_uploader/httprequesthandler.py, including the methods aseHttpRequestHandler.get_temp_root() and BaseHttpRequestHandler._post().
How can this vulnerability impact me? :
The vulnerability allows a remote attacker to execute arbitrary code on the affected system. This means an attacker could potentially take control of the system running the vulnerable fohrloop dash-uploader software, leading to unauthorized access, data compromise, or disruption of services.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The directory traversal vulnerability in dash-uploader allows remote attackers to execute arbitrary code and perform unauthorized file writes, which can lead to data breaches, unauthorized access, and persistent backdoors.
Such security flaws can compromise the confidentiality, integrity, and availability of sensitive data, potentially violating compliance requirements under standards like GDPR and HIPAA that mandate strict controls over personal and health information.
Because the vulnerability enables remote code execution and unauthorized file manipulation, organizations using affected versions of dash-uploader may face increased risk of non-compliance due to inadequate protection of sensitive data and failure to maintain secure systems.
Mitigation strategies such as migrating to more secure upload components or implementing strict validation are necessary to reduce compliance risks.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection of this vulnerability involves identifying attempts to exploit unsanitized user-controlled parameters such as upload_id, resumableFilename, and resumableIdentifier in HTTP requests to the dash-uploader service.
You can monitor HTTP POST requests to the dash_uploader/httprequesthandler.py endpoint for suspicious path traversal patterns (e.g., '../' sequences) in parameters like flowIdentifier, flowFilename, upload_id, resumableFilename, or resumableIdentifier.
Example commands to detect such attempts include using network traffic inspection tools or web server logs with grep or similar utilities to find directory traversal patterns.
- grep -r "\.\./" /var/log/nginx/access.log
- tcpdump -A -s 0 'tcp port 80 or tcp port 443' | grep -iE 'flowIdentifier|flowFilename|upload_id|resumableFilename|resumableIdentifier'
- Use a web application firewall (WAF) or reverse proxy logs to detect and block requests containing directory traversal payloads.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include discontinuing use of the vulnerable dash-uploader versions (0.1.0 through 0.7.0a2) since the project is archived and no patches are available.
You should migrate to alternative file upload components such as Plotly Dash's built-in dcc.Upload component, which is maintained and more secure.
If migration is not immediately possible, implement strict input validation and sanitization on all user-supplied parameters related to file uploads to prevent directory traversal.
Additionally, enforce security controls at the reverse-proxy or Web Application Firewall (WAF) layer to detect and block malicious payloads attempting directory traversal.
Consider developing a custom Flask upload handler with proper sanitization and validation as a temporary workaround.