CVE-2026-8115
Description
A security flaw has been discovered in gyoridavid short-video-maker up to 1.3.4. This affects an unknown part of the file src/server/routers/rest.ts of the component REST API. The manipulation of the argument req.params.tmpFile results in path traversal. The attack can be launched remotely. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A path traversal vulnerability in gyoridavid short-video-maker up to 1.3.4 allows remote attackers to read arbitrary files via the REST API.
Vulnerability
Overview
A path traversal vulnerability (CWE-22) has been identified in gyoridavid short-video-maker, an open-source tool for generating short-form videos. The flaw resides in the REST API component, specifically in the file src/server/routers/rest.ts. The manipulation of the req.params.tmpFile argument (and similarly req.params.fileName) allows an attacker to traverse outside the intended directories when the server streams files via fs.createReadStream [1][4].
Exploitation
The attack is remotely exploitable without authentication. The REST API routes /api/tmp/:tmpFile and /api/music/:fileName concatenate user-supplied route parameters with configured base directories (tempDirPath and musicDirPath). Because the resolved path is not validated to remain within the intended directory, an attacker can supply path traversal sequences (e.g., ../) to read arbitrary files on the server host [4]. A public exploit has been released, increasing the risk of active attacks [3].
Impact
Successful exploitation allows an attacker to read sensitive files outside the intended temp or music directories, potentially including configuration files, source code, or other data stored on the server. The CVSS v3 base score is 5.3 (Medium), reflecting the confidentiality impact without requiring authentication or user interaction [3].
Mitigation
Status
The project maintainer was informed of the vulnerability via an issue report but has not responded or released a fix as of the publication date [4]. Users of versions up to 1.3.4 are advised to apply input validation or restrict access to the affected endpoints until a patch is available.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
short-video-makernpm | <= 1.3.4 | — |
Affected products
2(expand)+ 1 more
- (no CPE)
- (no CPE)range: <=1.3.4
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6News mentions
0No linked articles in our index yet.