Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 13 Feb 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Citeum
Citeum opencti |
|
| CPEs | cpe:2.3:a:citeum:opencti:3.3.1:*:*:*:*:*:*:* | |
| Vendors & Products |
Citeum
Citeum opencti |
Tue, 03 Feb 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Opencti-platform
Opencti-platform opencti |
|
| Vendors & Products |
Opencti-platform
Opencti-platform opencti |
Mon, 02 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 30 Jan 2026 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenCTI 3.3.1 is vulnerable to a directory traversal attack via the static/css endpoint. An unauthenticated attacker can read arbitrary files from the filesystem by sending crafted GET requests with path traversal sequences (e.g., '../') in the URL. For example, requesting /static/css//../../../../../../../../etc/passwd returns the contents of /etc/passwd. This vulnerability was discovered by Raif Berkay Dincel and confirmed on Linux Mint and Windows 10. | |
| Title | OpenCTI 3.3.1 - Directory Traversal | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-05T01:27:37.387Z
Reserved: 2026-01-28T18:18:30.524Z
Link: CVE-2020-37041
Updated: 2026-02-02T20:11:36.198Z
Status : Analyzed
Published: 2026-01-30T23:16:09.750
Modified: 2026-02-13T17:56:55.973
Link: CVE-2020-37041
No data.
OpenCVE Enrichment
Updated: 2026-02-02T09:26:58Z