Description
An issue in the component /Controllers/RestController.php of DreamFactory Core v1.0.3 allows attackers to execute a directory traversal via an unsanitized URI path.
Published: 2026-03-20
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Directory Traversal, Confidentiality Breach
Action: Immediate Patch
AI Analysis

Impact

The affected component in DreamFactory Core is a PHP REST controller that fails to sanitize the URI path. An attacker can supply a crafted request that contains path traversal sequences, such as "../". This manipulation allows the application to read any file on the server that the web server process can access, potentially exposing sensitive configuration, credentials, or source code. The weakness is classified as CWE-22, a directory traversal flaw that directly compromises confidentiality, and may lead to further integrity or availability problems if attackers gain read access to critical files.

Affected Systems

The flaw is present only in DreamFactory Core version 1.0.3. Users running this exact version, or any earlier releases that have not been patched by the community commit referenced in the advisory, are affected. The product is the open‑source backend framework DreamFactory Core provided by DreamFactory software.

Risk and Exploitability

The CVSS base score is 7.2, indicating a high severity for a medium complexity attack. The EPSS score of less than 1% suggests that exploitation attempts are unlikely at present, and the vulnerability is not recorded in the CISA KEV list. Nevertheless, the ease of crafting the malicious URI and the fact that the flaw resides in a publicly exposed REST endpoint means that the attack vector is remote over HTTP or HTTPS. An attacker only needs network access to the application and the ability to send a JSON‑encoded request, making the exploitation relatively straightforward if the system exposes the vulnerable endpoint to the internet.

Generated by OpenCVE AI on April 14, 2026 at 21:11 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify the currently running DreamFactory Core version. If v1.0.3 or earlier is in use, update the application to the patched release that includes commit 54354605b2ec9afe6ee96756a5a22f6f56828950. This can be done by pulling the latest master branch and performing the database migration if required.
  • If a direct upgrade is not immediately possible, deploy a temporary file‑system path whitelist on the web server or reverse proxy to block requests containing "../" or other traversal patterns before they reach the DreamFactory application.

Generated by OpenCVE AI on April 14, 2026 at 21:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-gv7f-w92j-383q DreamFactory has a directory traversal
History

Wed, 15 Apr 2026 17:00:00 +0000

Type Values Removed Values Added
Title Directory Traversal via Unsanitized URI Path in DreamFactory Core

Tue, 14 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:dreamfactory:dreamfactory_core:1.0.3:*:*:*:*:*:*:*

Wed, 25 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Title Directory Traversal via Unsanitized URI Path in DreamFactory Core

Mon, 23 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-22
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Dreamfactory
Dreamfactory dreamfactory Core
Vendors & Products Dreamfactory
Dreamfactory dreamfactory Core

Fri, 20 Mar 2026 21:00:00 +0000

Type Values Removed Values Added
Description An issue in the component /Controllers/RestController.php of DreamFactory Core v1.0.3 allows attackers to execute a directory traversal via an unsanitized URI path.
References

Subscriptions

Dreamfactory Dreamfactory Core
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-03-23T14:19:41.703Z

Reserved: 2025-08-16T00:00:00.000Z

Link: CVE-2025-55988

cve-icon Vulnrichment

Updated: 2026-03-23T14:19:25.648Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-20T21:17:12.300

Modified: 2026-04-14T19:27:15.650

Link: CVE-2025-55988

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T16:45:09Z

Weaknesses