Description
Allure 2 is the version 2.x branch of Allure Report, a multi-language test reporting tool. The Allure report generator prior to version 2.38.0 is vulnerable to an arbitrary file read via path traversal when processing test results. An attacker can craft a malicious result file (-result.json, -container.json, or .plist) that points an attachment source to a sensitive file on the host system. During report generation, Allure will resolve these paths and include the sensitive files in the final report. Version 2.38.0 fixes the issue.
Published: 2026-03-20
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary File Read
Action: Immediate Patch
AI Analysis

Impact

An attacker can craft a malicious test result file that includes a path traversal reference to a sensitive file on the host system. During report generation, Allure resolves the path and embeds the file content in the final report, exposing confidential data without authentication. This flaw resides in the path handling of attachment sources (CWE‑22) and allows untrusted data to be read by the report generator.

Affected Systems

Allure Report version 2.x (Allure 2) prior to 2.38.0 is affected. The vulnerability impacts the Allure framework across Allure 1, Allure 2, and XCTest Readers, and any system that uses these components to generate test reports.

Risk and Exploitability

The CVSS score of 8.6 indicates high severity. Because the vulnerability requires only a malicious result file to be processed, any compromised CI/CD pipeline or build system that generates reports could be used. The attack does not require external network access; it is a file‑system compromise within the host where the report is generated. No public exploit is documented, and the issue is not listed in the KEV catalog, but the high severity and lack of mitigations suggest a strong likelihood of exploitation in projects that do not upgrade immediately.

Generated by OpenCVE AI on March 20, 2026 at 22:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Allure Report to version 2.38.0 or later.

Generated by OpenCVE AI on March 20, 2026 at 22:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-64hm-gfwq-jppw Allure Report has an Arbitrary File Read via Path Traversal in Attachment Processing (Allure 1, Allure 2, and XCTest Readers)
History

Tue, 14 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Qameta
Qameta allure Report
CPEs cpe:2.3:a:qameta:allure_report:*:*:*:*:*:*:*:*
Vendors & Products Qameta
Qameta allure Report

Tue, 24 Mar 2026 02:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Allure-framework
Allure-framework allure2
Vendors & Products Allure-framework
Allure-framework allure2

Fri, 20 Mar 2026 21:45:00 +0000

Type Values Removed Values Added
Description Allure 2 is the version 2.x branch of Allure Report, a multi-language test reporting tool. The Allure report generator prior to version 2.38.0 is vulnerable to an arbitrary file read via path traversal when processing test results. An attacker can craft a malicious result file (-result.json, -container.json, or .plist) that points an attachment source to a sensitive file on the host system. During report generation, Allure will resolve these paths and include the sensitive files in the final report. Version 2.38.0 fixes the issue.
Title Allure Report has an Arbitrary File Read via Path Traversal in Attachment Processing (Allure 1, Allure 2, and XCTest Readers)
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}


Subscriptions

Allure-framework Allure2
Qameta Allure Report
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-24T02:04:09.955Z

Reserved: 2026-03-17T21:17:08.888Z

Link: CVE-2026-33166

cve-icon Vulnrichment

Updated: 2026-03-24T02:04:06.012Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-20T22:16:28.660

Modified: 2026-04-14T18:42:27.007

Link: CVE-2026-33166

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:34:29Z

Weaknesses