[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2026-45230":6},{"stargazers_count":4,"fetched_at":5},6,"2026-05-19T01:41:25.914Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":40,"aliases":41,"duplicate_of":9,"upstream":42,"downstream":43,"duplicates":44,"related":45,"reserved_at":9,"published_at":46,"modified_at":47,"state":48,"summary":49,"references_raw":56,"kevs":69,"epss":9,"epss_history":70,"metrics":71,"affected":85},"CVE-2026-45230","DumbAssets through 1.0.11 contains a path traversal vulnerability in the POST /api/delete-file endpoint and filesToDelete array parameters that allows unauthenticated attackers to delete arbitrary files by supplying ../ sequences that bypass directory boundary validation. Attackers can exploit the optional and disabled-by-default authentication control to traverse outside the intended application directory and delete critical files such as server.js or package.json, causing complete denial of service.",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":18,"capec":19},"CWE-22","Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.","weakness","Stable","Base","High",[20,24,28,32,36],{"id":21,"name":22,"techniques":23},"CAPEC-126","Path Traversal",[],{"id":25,"name":26,"techniques":27},"CAPEC-64","Using Slashes and URL Encoding Combined to Bypass Validation Logic",[],{"id":29,"name":30,"techniques":31},"CAPEC-76","Manipulating Web Input to File System Calls",[],{"id":33,"name":34,"techniques":35},"CAPEC-78","Using Escaped Slashes in Alternate Encoding",[],{"id":37,"name":38,"techniques":39},"CAPEC-79","Using Slashes in Alternate Encoding",[],[],[],[],[],[],[],"2026-05-18T18:06:56.344Z","2026-05-18T21:28:45.184Z","Deferred",{"cisa_kev":50,"cisa_ransomware":50,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":51,"severity_score":52,"severity_version":53,"severity_source":54,"severity_vector":55,"severity_status":48},false,"critical",9.1,"v3.1","cve.org","CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",[57,64],{"url":58,"sources":59,"tags":61},"https://github.com/DumbWareio/DumbAssets/pull/136",[54,60],"nvd",[62,63],"Issue Tracking","Patch",{"url":65,"sources":66,"tags":67},"https://www.vulncheck.com/advisories/dumbassets-path-traversal-file-deletion-via-api-delete-file",[54,60],[68],"Third Party Advisory",[],[],[72,81],{"source":54,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":73,"cvss_v4_0":77},{"baseScore":52,"baseSeverity":74,"vectorString":55,"impactScore":75,"exploitabilityScore":76},"CRITICAL",8.7,10,{"baseScore":78,"baseSeverity":79,"vectorString":80,"impactScore":9,"exploitabilityScore":9},8.8,"HIGH","CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N",{"source":60,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":82,"cvss_v4_0":83},{"baseScore":52,"baseSeverity":74,"vectorString":55,"impactScore":75,"exploitabilityScore":76},{"baseScore":78,"baseSeverity":79,"vectorString":84,"impactScore":9,"exploitabilityScore":9},"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",[86],{"ecosystem":9,"name":87,"vendor":88,"product":89,"cpe_part":90,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":91},"DumbAssets","dumbwareio","dumbassets","a",[92],{"version":93,"is_range":94,"range_type":54,"version_start":9,"version_start_type":9,"version_end":95,"version_end_type":96,"fixed_in":9},"\u003C= 1.0.11",true,"1.0.11","including"]