Description
Blinko is an AI-powered card note-taking project. In versions from 1.8.3 and prior, the plugin file server endpoint uses join() to concatenate paths but does not verify if the final path is within the plugins directory, leading to path traversal. At time of publication, there are no publicly available patches.
Published: 2026-03-23
Score: 6.9 Medium
EPSS: 1.8% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Blinko’s plugin file server endpoint concatenates paths using join() without validating that the resolved location remains within the plugins directory, enabling attackers to supply a crafted request and read arbitrary files on the host filesystem. The vulnerability can disclose sensitive data, credentials, or configuration files, thereby compromising confidentiality and potentially enabling further compromise. This weakness corresponds to unchecked path traversal (CWE‑22).

Affected Systems

The issue affects blinkospace blinko versions 1.8.3 and earlier. End‑users running these releases are vulnerable through the publicly accessible /plugins endpoint. No specific hardware or operating system combinations were identified, but any environment running the affected BlinkO application is susceptible until upgraded.

Risk and Exploitability

The severity reflected in a CVSS score of 6.9 indicates moderate impact, yet the EPSS score of 2% signals a low likelihood of exploitation in the wild at present. The vulnerability is not listed in CISA’s KEV catalog, implying that no large‑scale attacks have been documented. Based on the description, the likely attack vector is remote via a crafted HTTP request to the plugin endpoint; the attacker does not require elevated privileges but must be able to reach the BlinkO instance over the network. Until a patch is published, the risk remains theoretical but could be mitigated by restricting external access to the relevant endpoint or disabling the plugin feature entirely.

Generated by OpenCVE AI on May 2, 2026 at 00:45 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check for a vendor‑issued update to BlinkO and upgrade to a patched version when available.
  • If an immediate update cannot be applied, restrict external access to the /plugins endpoint with firewall or network ACL rules.
  • Consider disabling the plugin file server feature if it is not essential to your workflow.
  • Monitor official advisories and security mailing lists for forthcoming patches or workarounds.

Generated by OpenCVE AI on May 2, 2026 at 00:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Blinko
Blinko blinko
CPEs cpe:2.3:a:blinko:blinko:*:*:*:*:*:*:*:*
Vendors & Products Blinko
Blinko blinko
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Tue, 24 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Blinkospace
Blinkospace blinko
Vendors & Products Blinkospace
Blinkospace blinko

Tue, 24 Mar 2026 02:30:00 +0000

Type Values Removed Values Added
Description Blinko is an AI-powered card note-taking project. In versions from 1.8.3 and prior, the plugin file server endpoint uses join() to concatenate paths but does not verify if the final path is within the plugins directory, leading to path traversal. At time of publication, there are no publicly available patches.
Title Blinko: Unauthorized Arbitrary File Read - /plugins
Weaknesses CWE-22
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-24T16:03:10.291Z

Reserved: 2026-01-13T15:47:41.628Z

Link: CVE-2026-23483

cve-icon Vulnrichment

Updated: 2026-03-24T16:02:50.343Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-23T21:17:02.547

Modified: 2026-03-24T18:46:30.670

Link: CVE-2026-23483

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T00:45:30Z

Weaknesses