CVE-2026-29220
Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Apache OFBiz.
This issue affects Apache OFBiz: before 24.09.06.
Users are recommended to upgrade to version 24.09.06, which fixes the issue.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Apache OFBiz before 24.09.06 contains a path traversal vulnerability in the Content component allowing low-privilege local file inclusion.
Vulnerability
A path traversal vulnerability exists in the Content component of Apache OFBiz versions before 24.09.06. The software fails to properly restrict file paths, allowing an attacker to escape the intended directory. This issue is classified as an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') [1].
Exploitation
An attacker with low-privilege authenticated access to the OFBiz application can exploit this by crafting HTTP requests containing path traversal sequences (e.g., ../). No additional user interaction is required beyond the initial authentication. The vulnerability is reachable through the Content component's file handling endpoints [1].
Impact
Successful exploitation enables local file inclusion (LFI), allowing the attacker to read arbitrary files from the server's filesystem. This can lead to disclosure of sensitive information such as configuration files, database credentials, or other application secrets. Depending on the exposed data, privilege escalation may be possible [1].
Mitigation
Users should upgrade to Apache OFBiz version 24.09.06, which contains the fix for this vulnerability. No workarounds have been published. The issue is not listed on the CISA Known Exploited Vulnerabilities (KEV) catalog as of the publication date [1].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- lists.apache.org/thread/5hjnmt9no6mmtg8sxq3mhonzff1vkd5mnvdMailing ListVendor Advisory
- www.openwall.com/lists/oss-security/2026/05/19/15nvd
News mentions
0No linked articles in our index yet.