CWE · MITRE source
CWE-25Path Traversal: '/../filedir'
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize "/../" sequences that can resolve to a location that is outside of that directory.
This allows attackers to traverse the file system to access files or directories that are outside of the restricted directory. Sometimes a program checks for "../" at the beginning of the input, so a "/../" can bypass that check.
Last updated: 09 May 2026 03:25 UTC
NIST 800-53 r5 controls that address this weakness (0)AI
| Control | Title | Family | Why it addresses this CWE |
|---|---|---|---|
| No NIST controls proposed yet. | |||
Top CVEs of this weakness type, ranked by Risk Priority
| CVE | Risk | CVSS | EPSS | Published |
|---|---|---|---|---|
CVE-2022-20775 KEV | 3.6 | 7.8 | 0.0042 | 2022-09-30 |
CVE-2023-52076 | 2.4 | 8.5 | 0.1176 | 2024-01-25 |
CVE-2025-68916 | 1.9 | 9.1 | 0.0145 | 2025-12-24 |
CVE-2023-52138 | 1.8 | 8.2 | 0.0253 | 2024-02-05 |
CVE-2023-6947 | 1.8 | 7.7 | 0.0463 | 2024-12-10 |
CVE-2022-20818 | 1.6 | 7.8 | 0.0052 | 2022-09-30 |
CVE-2023-6118 | 1.5 | 7.5 | 0.0010 | 2023-11-23 |
CVE-2023-6919 | 1.5 | 7.5 | 0.0024 | 2024-01-26 |
CVE-2024-2442 | 1.5 | 7.5 | 0.0016 | 2024-03-19 |
CVE-2025-0225 | 0.9 | 4.3 | 0.0024 | 2025-01-05 |
CVE-2026-23877 | 0.9 | 4.3 | 0.0007 | 2026-01-19 |
CVE-2025-58286 | 0.7 | 3.3 | 0.0001 | 2025-10-11 |