CVE-2023-46497
Description
Directory Traversal vulnerability in EverShop NPM versions before v.1.0.0-rc.8 allows a remote attacker to obtain sensitive information via a crafted request to the mkdirSync function in the folderCreate/createFolder.js endpoint.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Directory traversal in EverShop before v1.0.0-rc.8 allows remote attackers to create folders outside the intended directory via the mkdirSync function.
Vulnerability
CVE-2023-46497 is a directory traversal vulnerability in EverShop, a TypeScript e-commerce platform, affecting versions prior to v1.0.0-rc.8. The root cause is missing input validation in the mkdirSync function within the folderCreate/createFolder.js endpoint, which allows a remote attacker to use '../' sequences in a crafted request to navigate outside the intended directory [1][3].
Exploitation
An attacker can exploit this vulnerability by sending a specially crafted request to the folder creation feature, typically used when adding an image to a product's 'Description' field. The attack requires network access and high privileges (e.g., being an authenticated user with file upload capabilities), but no user interaction is needed. By supplying a path containing relative path traversal sequences like ../, the attacker can cause the application to create folders in arbitrary locations on the server [3].
Impact
The vulnerability allows an attacker to create folders in unintended locations, potentially affecting system processes or other applications. While the CVE description and references specify that this can lead to obtaining sensitive information [1], the Checkmarx analysis also notes that folder creation outside the intended scope may impact system integrity. The CVSS vector indicates no direct confidentiality or availability impact, but integrity impact is rated as low, and the scope is changed, meaning the vulnerable component impacts resources beyond its security scope [3].
Mitigation
EverShop patched this vulnerability in version 1.0.0-rc.8. The fix was implemented in a pull request that addressed the missing input validation [4]. Users are strongly advised to upgrade to the latest version to mitigate the risk of directory traversal attacks. No workarounds are documented, and as of the publication date, the CVE is not listed in CISA's Known Exploited Vulnerabilities (KEV) catalog.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
@evershop/evershopnpm | < 1.0.0-rc.8 | 1.0.0-rc.8 |
Affected products
2- EverShop/EverShop NPMdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- github.com/advisories/GHSA-7443-5962-wp4rghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-46497ghsaADVISORY
- devhub.checkmarx.com/cve-details/CVE-2023-46497ghsaWEB
- devhub.checkmarx.com/cve-details/Cx16846793-56b6ghsaWEB
- github.com/evershopcommerce/evershop/pull/338ghsaWEB
- devhub.checkmarx.com/cve-details/CVE-2023-46497/mitre
- devhub.checkmarx.com/cve-details/Cx16846793-56b6/mitre
News mentions
0No linked articles in our index yet.