Voyager 1.3.0 contains a directory traversal vulnerability that allows attackers to access sensitive system files by manipulating the asset path parameter. Attackers can exploit the path parameter in /admin/voyager-assets to read arbitrary files like /etc/passwd and .env configuration files.

Project Subscriptions

Vendors Products
Thecontrolgroup Subscribe
Voyager Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 12 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Feb 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Thecontrolgroup
Thecontrolgroup voyager
Vendors & Products Thecontrolgroup
Thecontrolgroup voyager

Wed, 11 Feb 2026 21:00:00 +0000

Type Values Removed Values Added
Description Voyager 1.3.0 contains a directory traversal vulnerability that allows attackers to access sensitive system files by manipulating the asset path parameter. Attackers can exploit the path parameter in /admin/voyager-assets to read arbitrary files like /etc/passwd and .env configuration files.
Title Voyager 1.3.0 - Directory Traversal
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-02-12T15:45:19.712Z

Reserved: 2026-02-10T19:03:15.861Z

Link: CVE-2020-37214

cve-icon Vulnrichment

Updated: 2026-02-12T15:45:15.671Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-11T21:16:17.170

Modified: 2026-02-12T15:10:37.307

Link: CVE-2020-37214

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-02-12T10:00:53Z

Weaknesses