CVE-2024-35219
Description
OpenAPI Generator allows generation of API client libraries (SDK generation), server stubs, documentation and configuration automatically given an OpenAPI Spec. Prior to version 7.6.0, attackers can exploit a path traversal vulnerability to read and delete files and folders from an arbitrary, writable directory as anyone can set the output folder when submitting the request via the outputFolder option. The issue was fixed in version 7.6.0 by removing the usage of the outputFolder option. No known workarounds are available.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.openapitools:openapi-generator-onlineMaven | < 7.6.0 | 7.6.0 |
Patches
1edbb021aadaeVulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- github.com/advisories/GHSA-g3hr-p86p-593hghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-35219ghsaADVISORY
- github.com/OpenAPITools/openapi-generator/commit/edbb021aadae47dcfe690313ce5119faf77f800dnvdWEB
- github.com/OpenAPITools/openapi-generator/pull/18652nvdWEB
- github.com/OpenAPITools/openapi-generator/security/advisories/GHSA-g3hr-p86p-593hnvdWEB
News mentions
0No linked articles in our index yet.