CVE-2026-8115
Deferred Deferred - Pending Action
Path Traversal in Short Video Maker REST API

Publication date: 2026-05-07

Last updated on: 2026-05-07

Assigner: VulDB

Description
A security flaw has been discovered in gyoridavid short-video-maker up to 1.3.4. This affects an unknown part of the file src/server/routers/rest.ts of the component REST API. The manipulation of the argument req.params.tmpFile results in path traversal. The attack can be launched remotely. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-07
Last Modified
2026-05-07
Generated
2026-05-09
AI Q&A
2026-05-08
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
gyoridavid short-video-maker to 1.3.4 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

This vulnerability can allow an attacker to access unauthorized files on the server by exploiting the path traversal flaw. This could lead to exposure of sensitive information, unauthorized data access, or potentially further attacks depending on the files accessed.


Can you explain this vulnerability to me?

This vulnerability is a security flaw in the gyoridavid short-video-maker software up to version 1.3.4. It exists in the REST API component, specifically in the file src/server/routers/rest.ts. The issue arises from improper handling of the argument req.params.tmpFile, which allows an attacker to perform a path traversal attack. This means an attacker can manipulate the file path to access files and directories outside the intended scope.

The attack can be launched remotely, and an exploit for this vulnerability has already been publicly released.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart