VYPR
Medium severity5.3NVD Advisory· Published Apr 26, 2026· Updated Apr 27, 2026

CVE-2026-7059

CVE-2026-7059

Description

A vulnerability was found in 666ghj MiroFish up to 0.1.2. This affects the function get_simulation_posts of the file backend/app/api/simulation.py of the component Query Parameter Handler. Performing a manipulation of the argument Platform results in path traversal. The attack can be initiated remotely. The exploit has been made public and could be used.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

MiroFish v0.1.2's API endpoint uses an unvalidated platform query parameter to construct SQLite database paths, enabling remote path traversal.

Root

Cause CVE-2026-7059 is a path traversal vulnerability in MiroFish v0.1.2, specifically in the get_simulation_posts function of backend/app/api/simulation.py [1]. The component mishandles the platform query parameter by directly interpolating it into a SQLite database filename pattern ({platform}_simulation.db) without any sanitization or validation [1]. This allows an attacker to inject directory traversal sequences (e.g., ../) via the platform parameter, leading to arbitrary database file access [1].

Exploitation

An unauthenticated attacker can exploit this vulnerability remotely by sending a crafted GET request to the /api/simulation/<simulation_id>/posts endpoint [1]. No authentication is required, and the attack does not rely on a POST body — the malicious platform value is simply supplied as a query string parameter [1]. The path traversal sequence in the platform argument enables the attacker to navigate outside the intended uploads/simulations/ directory [1].

Impact

Successful exploitation allows an attacker to read the full contents of any SQLite database file on the server that ends with _simulation.db [1]. This includes sensitive data such as posts, comments, and related counts from other simulations [1]. The vulnerability leads to high confidentiality impact without any requirement for user interaction or special privileges [1].

Mitigation

As of the advisory publication, no patch has been released for MiroFish v0.1.2 [1]. The vendor has been notified, and users are advised to apply input validation on the platform parameter — specifically by rejecting any values containing path traversal sequences or by restricting the parameter to a whitelist of allowed platform identifiers [1]. The vulnerability has been publicly disclosed, increasing the risk of exploitation [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.