VYPR
High severityNVD Advisory· Published May 14, 2026· Updated May 15, 2026

CVE-2026-44647

CVE-2026-44647

Description

OneDev is a Git server with CI/CD, kanban, and packages. Prior to 15.0.2, there is behavior that breaks the expected boundary between repository-controlled LFS metadata and server-local filesystem paths. A repository object can steer raw blob reads to arbitrary local files that the server account can access. User with push permission to any repository will be able to access any server files accessible by server process. This vulnerability is fixed in 15.0.2.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

OneDev before 15.0.2 allows users with push access to read any server file via a path traversal in Git LFS pointer resolution.

Vulnerability

CVE-2026-44647 is a path traversal vulnerability in OneDev, a Git server with CI/CD features. The bug resides in how the application resolves Git LFS (Large File Storage) pointers. A specially crafted repository object can trick the server into reading arbitrary local files from the filesystem, instead of only permitted LFS storage paths. This violates the expected boundary between repository-controlled metadata and the server's filesystem.

Exploitation

To exploit this, an attacker needs only push permission to any repository on the OneDev instance. No additional authentication or network position is required. By manipulating LFS pointer metadata in a pushed commit, the attacker can direct the blob read operation to any file path accessible by the server process. The advisory describes a read capability that breaks the separation between repository data and server-local paths [1].

Impact

A successful attack allows an authenticated user with push rights to read any file that the OneDev server process can access. This includes sensitive files such as configuration files, secrets, private keys, or database credentials, depending on the server's environment and permissions. The impact is high because it exposes the underlying server infrastructure to a low-privileged attacker.

Mitigation

The vulnerability is fixed in OneDev version 15.0.2 [1]. Users should upgrade immediately. No workarounds are mentioned. This CVE is not listed on CISA's Known Exploited Vulnerabilities catalog as of the publication date.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Theonedev/Onedevinferred2 versions
    <15.0.2+ 1 more
    • (no CPE)range: <15.0.2
    • (no CPE)range: <15.0.2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.