CWE · MITRE source
CWE-26Path Traversal: '/dir/../filename'
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize "/dir/../filename" sequences that can resolve to a location that is outside of that directory.
This allows attackers to traverse the file system to access files or directories that are outside of the restricted directory. The '/dir/../filename' manipulation is useful for bypassing some path traversal protection schemes. Sometimes a program only checks for "../" at the beginning of the input, so a "/../" can bypass that check.
Last updated: 09 May 2026 03:25 UTC
NIST 800-53 r5 controls that address this weakness (0)AI
| Control | Title | Family | Why it addresses this CWE |
|---|---|---|---|
| No NIST controls proposed yet. | |||
Top CVEs of this weakness type, ranked by Risk Priority
| CVE | Risk | CVSS | EPSS | Published |
|---|---|---|---|---|
CVE-2024-28064 | 2.0 | 9.8 | 0.0120 | 2024-05-18 |
CVE-2023-50255 | 1.9 | 9.3 | 0.0043 | 2023-12-27 |
CVE-2024-29466 | 1.8 | 8.8 | 0.0084 | 2024-04-30 |
CVE-2021-34762 | 1.6 | 8.1 | 0.0019 | 2021-10-27 |
CVE-2021-42021 | 1.6 | 7.5 | 0.0100 | 2021-11-09 |
CVE-2023-25802 | 1.6 | 7.5 | 0.0126 | 2023-03-13 |
CVE-2024-25466 | 1.6 | 7.8 | 0.0104 | 2024-02-16 |
CVE-2024-5865 | 1.6 | 7.7 | 0.0018 | 2024-07-02 |
CVE-2024-31551 | 1.5 | 7.5 | 0.0055 | 2024-04-26 |
CVE-2026-25575 | 1.5 | 7.5 | 0.0006 | 2026-02-04 |
CVE-2024-20345 | 1.3 | 6.5 | 0.0031 | 2024-03-06 |
CVE-2022-45133 | 1.3 | 6.5 | 0.0026 | 2025-08-22 |
CVE-2024-5866 | 1.0 | 5.0 | 0.0016 | 2024-07-02 |
CVE-2025-25295 | 0.0 | 0.0 | 0.0013 | 2025-02-14 |
CVE-2025-53908 | 0.0 | 0.0 | 0.0013 | 2025-07-16 |