An Information Disclosure due to insufficient input validation exists in Apache Tapestry 5.4.0 and later
Description
Information Exposure vulnerability in context asset handling of Apache Tapestry allows an attacker to download files inside WEB-INF if using a specially-constructed URL. This was caused by an incomplete fix for CVE-2020-13953. This issue affects Apache Tapestry Apache Tapestry 5.4.0 version to Apache Tapestry 5.6.3; Apache Tapestry 5.7.0 version and Apache Tapestry 5.7.1.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Apache Tapestry fails to properly filter HTTP requests, letting remote attackers download WEB-INF files without authentication.
Vulnerability
An information exposure vulnerability exists in the context asset handling of Apache Tapestry [1][2]. The flaw resides in the ContextAssetRequestHandler class and results from improper filtering of HTTP requests, allowing specially-constructed URLs to bypass access controls [2]. This was caused by an incomplete fix for CVE-2020-13953 [1]. Affected versions are Apache Tapestry 5.4.0 up to and including 5.6.3, as well as 5.7.0 and 5.7.1 [1][2][3].
Exploitation
No authentication is required [2]. An attacker on the network can construct a malicious URL that exploits the improper input validation [3]. The vulnerability can be triggered remotely without user interaction [2]. By sending such a request, the attacker can download files located inside the WEB-INF directory of the application [1][2].
Impact
Successful exploitation leads to disclosure of sensitive information, as files within WEB-INF may contain configuration data, credentials, or source code [2]. The information disclosure occurs in the context of the SYSTEM level, meaning the attacker gains access to files normally protected from direct access [2]. The confidentiality impact is high, while integrity and availability are not affected [2].
Mitigation
Apache released fixed versions: upgrade to 5.6.4 for the 5.4.x–5.6.x branch, or 5.7.2 for the 5.7.x branch [3]. No workaround has been provided in the available references. The vulnerability is not listed on CISA’s Known Exploited Vulnerabilities (KEV) catalog.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.apache.tapestry:tapestry-coreMaven | >= 5.4.0, < 5.6.4 | 5.6.4 |
org.apache.tapestry:tapestry-coreMaven | >= 5.7.0, < 5.7.2 | 5.7.2 |
Affected products
2- Apache Software Foundation/Apache Tapestryv5Range: Apache Tapestry
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- github.com/advisories/GHSA-ghm8-mmx7-xvg2ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2021-30638ghsaADVISORY
- www.openwall.com/lists/oss-security/2021/04/27/3ghsamailing-listx_refsource_MLISTWEB
- lists.apache.org/thread.html/r37dab61fc7f7088d4311e7f995ef4117d58d86a675f0256caa6991eb%40%3Cusers.tapestry.apache.org%3Eghsax_refsource_MISCWEB
- security.netapp.com/advisory/ntap-20210528-0004ghsaWEB
- security.netapp.com/advisory/ntap-20210528-0004/mitrex_refsource_CONFIRM
- www.zerodayinitiative.com/advisories/ZDI-21-491ghsaWEB
- www.zerodayinitiative.com/advisories/ZDI-21-491/mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.