VYPR
Medium severity5.3NVD Advisory· Published Apr 7, 2026· Updated Apr 16, 2026

CVE-2026-35583

CVE-2026-35583

Description

Emissary is a P2P based data-driven workflow engine. Prior to 8.39.0, the configuration API endpoint (/api/configuration/{name}) validated configuration names using a blacklist approach that checked for \, /, .., and trailing .. This could potentially be bypassed using URL-encoded variants, double-encoding, or Unicode normalization to achieve path traversal and read configuration files outside the intended directory. This vulnerability is fixed in 8.39.0.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
gov.nsa.emissary:emissaryMaven
< 8.39.08.39.0

Affected products

1
  • cpe:2.3:a:nsa:emissary:*:*:*:*:*:*:*:*
    Range: <=8.38.0

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

1