Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-459f-x8vq-xjjm | Static Web Server vulnerable to a symbolic link path traversal |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 11 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Static-web-server
Static-web-server static Web Server |
|
| Weaknesses | CWE-59 | |
| CPEs | cpe:2.3:a:static-web-server:static_web_server:*:*:*:*:*:rust:*:* | |
| Vendors & Products |
Static-web-server
Static-web-server static Web Server |
|
| Metrics |
cvssV3_1
|
Tue, 09 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 09 Dec 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Static-web-server Project
Static-web-server Project static-web-server |
|
| Vendors & Products |
Static-web-server Project
Static-web-server Project static-web-server |
Tue, 09 Dec 2025 04:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Static Web Server (SWS) is a production-ready web server suitable for static web files or assets. Versions 2.40.0 and below contain symbolic links (symlinks) which can be used to access files or directories outside the intended web root folder. SWS generally does not prevent symlinks from escaping the web server’s root directory. Therefore, if a malicious actor gains access to the web server’s root directory, they could create symlinks to access other files outside the designated web root folder either by URL or via the directory listing. This issue is fixed in version 2.40.1. | |
| Title | Static Web Server is vulnerable to symbolic link Path Traversal | |
| Weaknesses | CWE-61 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-12-09T16:02:20.028Z
Reserved: 2025-12-08T18:02:08.846Z
Link: CVE-2025-67487
Updated: 2025-12-09T14:23:23.025Z
Status : Analyzed
Published: 2025-12-09T16:18:24.053
Modified: 2025-12-11T16:06:17.843
Link: CVE-2025-67487
No data.
OpenCVE Enrichment
Updated: 2025-12-09T10:04:39Z
Github GHSA