Impact
A path traversal flaw in Sanster IOPaint version 1.5.3 allows an attacker to manipulate the filename argument passed to the _get_file function, enabling unauthorized access to files on the host system. This weakness permits reading sensitive files outside the intended directory structure, which could lead to exposure of configuration data or other confidential information. The vulnerability is identified as CWE-22, indicating a classic path traversal issue that compromises data confidentiality.
Affected Systems
The affected product is Sanster IOPaint 1.5.3. No other versions or vendors are listed. The vendor has not responded to the exposure, so the issue remains unpatched in this release.
Risk and Exploitability
The CVSS score of 6.9 reflects moderate to high severity, and the exploit is publicly available, making remote exploitation feasible. Although the EPSS score is not provided and the vulnerability is not in the CISA KEV catalog, the public nature of the exploit and the remote attack vector increase the risk of compromise. An attacker can reach the service over the network, craft a malicious filename, and obtain arbitrary file contents, potentially leading to further exploitation or data loss.
OpenCVE Enrichment