VYPR
Medium severity5.3NVD Advisory· Published May 7, 2026· Updated May 8, 2026

CVE-2026-8115

CVE-2026-8115

Description

A security flaw has been discovered in gyoridavid short-video-maker up to 1.3.4. This affects an unknown part of the file src/server/routers/rest.ts of the component REST API. The manipulation of the argument req.params.tmpFile results in path traversal. The attack can be launched remotely. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A path traversal vulnerability in gyoridavid short-video-maker up to 1.3.4 allows remote attackers to read arbitrary files via the REST API.

Vulnerability

Overview

A path traversal vulnerability (CWE-22) has been identified in gyoridavid short-video-maker, an open-source tool for generating short-form videos. The flaw resides in the REST API component, specifically in the file src/server/routers/rest.ts. The manipulation of the req.params.tmpFile argument (and similarly req.params.fileName) allows an attacker to traverse outside the intended directories when the server streams files via fs.createReadStream [1][4].

Exploitation

The attack is remotely exploitable without authentication. The REST API routes /api/tmp/:tmpFile and /api/music/:fileName concatenate user-supplied route parameters with configured base directories (tempDirPath and musicDirPath). Because the resolved path is not validated to remain within the intended directory, an attacker can supply path traversal sequences (e.g., ../) to read arbitrary files on the server host [4]. A public exploit has been released, increasing the risk of active attacks [3].

Impact

Successful exploitation allows an attacker to read sensitive files outside the intended temp or music directories, potentially including configuration files, source code, or other data stored on the server. The CVSS v3 base score is 5.3 (Medium), reflecting the confidentiality impact without requiring authentication or user interaction [3].

Mitigation

Status

The project maintainer was informed of the vulnerability via an issue report but has not responded or released a fix as of the publication date [4]. Users of versions up to 1.3.4 are advised to apply input validation or restrict access to the affected endpoints until a patch is available.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
short-video-makernpm
<= 1.3.4

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.