Description
A vulnerability has been found in DataLinkDC dinky up to 1.2.5. The affected element is the function getProjectDir of the file dinky-admin/src/main/java/org/dinky/utils/GitRepository.java of the component Project Name Handler. Such manipulation of the argument projectName leads to path traversal. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-02-24
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Path Traversal
Action: Patch
AI Analysis

Impact

The vulnerability resides in the getProjectDir function of DataLinkDC dinky’s Project Name Handler. By manipulating the projectName argument, an attacker can inject path traversal sequences to escape the intended project directory and read arbitrary files on the host, achieving a directory traversal flaw identified as CWE-22. The attack can be performed from a remote source, allowing the attacker to potentially access sensitive configuration or code files outside the normal repository scope.

Affected Systems

DataLinkDC dinky versions up to 1.2.5 are affected. The flaw exists in the file dinky-admin/src/main/java/org/dinky/utils/GitRepository.java within the Project Name Handler component.

Risk and Exploitability

The CVSS base score of 5.3 reflects moderate severity, while the EPSS score of less than 1% indicates a low expected exploitation probability at present. This vulnerability is not listed in the CISA KEV catalog. Remote exploitation is feasible by sending a specially crafted projectName value from an external network, potentially granting an attacker read access to files outside the intended directory. No further privileges or conditions are explicitly required, making the risk realistic for exposed configurations.

Generated by OpenCVE AI on April 18, 2026 at 11:00 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade DataLinkDC dinky to a version newer than 1.2.5 where the path traversal bug is fixed
  • If an immediate upgrade is not possible, restrict external access to the application by firewall rules or network segmentation
  • Add server-side validation to ensure projectName does not contain directory traversal characters such as '..' or slashes, and enforce a whitelist of allowed project names

Generated by OpenCVE AI on April 18, 2026 at 11:00 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 28 Feb 2026 03:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Dinky
Dinky dinky
CPEs cpe:2.3:a:dinky:dinky:*:*:*:*:*:*:*:*
Vendors & Products Dinky
Dinky dinky

Tue, 24 Feb 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Datalinkdc
Datalinkdc dinky
Vendors & Products Datalinkdc
Datalinkdc dinky

Tue, 24 Feb 2026 01:15:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in DataLinkDC dinky up to 1.2.5. The affected element is the function getProjectDir of the file dinky-admin/src/main/java/org/dinky/utils/GitRepository.java of the component Project Name Handler. Such manipulation of the argument projectName leads to path traversal. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title DataLinkDC dinky Project Name GitRepository.java getProjectDir path traversal
Weaknesses CWE-22
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-26T15:17:31.925Z

Reserved: 2026-02-23T17:50:02.483Z

Link: CVE-2026-3051

cve-icon Vulnrichment

Updated: 2026-02-26T15:17:22.436Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-24T01:16:16.527

Modified: 2026-02-25T20:09:23.630

Link: CVE-2026-3051

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T11:15:35Z

Weaknesses