CWE · MITRE source
CWE-23Relative Path Traversal
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as ".." that can resolve to a location that is outside of that directory.
Last updated: 09 May 2026 03:25 UTC
NIST 800-53 r5 controls that address this weakness (0)AI
| Control | Title | Family | Why it addresses this CWE |
|---|---|---|---|
| No NIST controls proposed yet. | |||
Top CVEs of this weakness type, ranked by Risk Priority
| CVE | Risk | CVSS | EPSS | Published |
|---|---|---|---|---|
CVE-2021-40870 KEV | 9.6 | 9.8 | 0.9426 | 2021-09-13 |
CVE-2025-64446 KEV | 9.5 | 9.8 | 0.9291 | 2025-11-14 |
CVE-2020-5410 KEV | 9.2 | 7.5 | 0.9436 | 2020-06-02 |
CVE-2024-27199 KEV | 8.9 | 7.3 | 0.9135 | 2024-03-04 |
CVE-2020-17518 | 7.1 | 7.5 | 0.9398 | 2021-01-05 |
CVE-2022-23854 | 7.0 | 7.5 | 0.9218 | 2022-12-23 |
CVE-2025-34510 | 7.0 | 8.8 | 0.8699 | 2025-06-17 |
CVE-2023-2356 | 6.9 | 7.5 | 0.9045 | 2023-04-28 |
CVE-2020-5405 | 6.6 | 6.5 | 0.8799 | 2020-03-05 |
CVE-2023-6825 | 6.0 | 9.9 | 0.6650 | 2024-03-13 |
CVE-2020-5284 | 5.9 | 4.4 | 0.8321 | 2020-03-30 |
CVE-2024-24578 | 5.9 | 10.0 | 0.6421 | 2024-03-18 |
CVE-2023-34990 | 5.9 | 9.8 | 0.6633 | 2024-12-18 |
CVE-2022-1373 | 5.6 | 7.2 | 0.6858 | 2022-08-17 |
CVE-2022-29844 | 4.7 | 6.7 | 0.5529 | 2023-01-26 |
CVE-2020-8271 | 4.3 | 9.8 | 0.3930 | 2020-11-16 |
CVE-2024-2053 | 4.0 | 7.5 | 0.4086 | 2024-03-21 |
CVE-2024-43454 | 3.1 | 7.1 | 0.2883 | 2024-09-10 |
CVE-2023-1112 | 2.8 | 4.7 | 0.3180 | 2023-03-01 |
CVE-2025-52207 | 2.6 | 9.9 | 0.0967 | 2025-06-27 |
CVE-2023-42791 | 2.4 | 8.8 | 0.1128 | 2024-02-20 |
CVE-2024-30010 | 2.4 | 8.8 | 0.1040 | 2024-05-14 |
CVE-2024-11311 | 2.4 | 9.8 | 0.0684 | 2024-11-18 |
CVE-2024-11312 | 2.4 | 9.8 | 0.0684 | 2024-11-18 |
CVE-2024-11313 | 2.4 | 9.8 | 0.0684 | 2024-11-18 |