Description
A vulnerability was found in elecV2 elecV2P up to 3.8.3. The affected element is the function path.join of the file /log/ of the component Wildcard Handler. The manipulation results in path traversal. The attack may be performed from remote. The exploit has been made public and could be used. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-03-28
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote file disclosure via path traversal
Action: Patch
AI Analysis

Impact

A path traversal flaw was discovered in elecV2P’s Wildcard Handler. The bug is triggered by the path.join function in the /log/ component and allows an attacker to construct file paths that resolve outside the intended log directory. The result is the disclosure of arbitrary files on the host filesystem, potentially revealing confidential information and opening the door to further compromise.

Affected Systems

All releases of elecV2P up to version 3.8.3 contain the vulnerable Wildcard Handler module. The flaw resides in the construction of log file paths within the /log/ directory of the elecV2 vendor’s software.

Risk and Exploitability

The vulnerability carries a CVSS score of 6.9, indicating medium severity. Exploitation requires only network access to the vulnerable component and does not need authentication. A public exploit exists, increasing the likelihood of real‑world attacks. The EPSS score is not available, and the flaw is not listed in the CISA KEV catalog, but the combination of remote exploitability and public availability suggests a significant risk.

Generated by OpenCVE AI on March 28, 2026 at 23:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a vendor patch or upgrade to a fixed release of elecV2P as soon as it becomes available.
  • If no patch is available, isolate the Wildcard Handler from external networks or restrict access with firewalls or network segmentation.
  • Constrain file system permissions on the log directory to limit exposure of sensitive files that could be read via the traversal flaw.

Generated by OpenCVE AI on March 28, 2026 at 23:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 30 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 30 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Elecv2
Elecv2 elecv2p
Vendors & Products Elecv2
Elecv2 elecv2p

Sat, 28 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in elecV2 elecV2P up to 3.8.3. The affected element is the function path.join of the file /log/ of the component Wildcard Handler. The manipulation results in path traversal. The attack may be performed from remote. The exploit has been made public and could be used. The project was informed of the problem early through an issue report but has not responded yet.
Title elecV2 elecV2P Wildcard log path.join path traversal
Weaknesses CWE-22
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:N/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-30T16:00:42.594Z

Reserved: 2026-03-27T14:11:41.480Z

Link: CVE-2026-5014

cve-icon Vulnrichment

Updated: 2026-03-30T16:00:38.197Z

cve-icon NVD

Status : Deferred

Published: 2026-03-28T21:17:00.423

Modified: 2026-04-24T16:36:24.067

Link: CVE-2026-5014

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T06:58:51Z

Weaknesses