Description
A vulnerability was found in Sanster IOPaint 1.5.3. Impacted is the function _get_file of the file iopaint/file_manager/file_manager.py of the component File Manager. Performing a manipulation of the argument filename results in path traversal. The attack is possible to be carried out remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-04-01
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote File Disclosure via Path Traversal
Action: Apply Patch
AI Analysis

Impact

A path traversal flaw in Sanster IOPaint version 1.5.3 allows an attacker to manipulate the filename argument passed to the _get_file function, enabling unauthorized access to files on the host system. This weakness permits reading sensitive files outside the intended directory structure, which could lead to exposure of configuration data or other confidential information. The vulnerability is identified as CWE-22, indicating a classic path traversal issue that compromises data confidentiality.

Affected Systems

The affected product is Sanster IOPaint 1.5.3. No other versions or vendors are listed. The vendor has not responded to the exposure, so the issue remains unpatched in this release.

Risk and Exploitability

The CVSS score of 6.9 reflects moderate to high severity, and the exploit is publicly available, making remote exploitation feasible. Although the EPSS score is not provided and the vulnerability is not in the CISA KEV catalog, the public nature of the exploit and the remote attack vector increase the risk of compromise. An attacker can reach the service over the network, craft a malicious filename, and obtain arbitrary file contents, potentially leading to further exploitation or data loss.

Generated by OpenCVE AI on April 1, 2026 at 08:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to a patched version of Sanster IOPaint if one is available; apply the vendor’s official update.
  • If no patch exists, limit the exposure of the IOPaint service by restricting inbound network access or placing it behind a firewall.
  • Configure the underlying file system permissions to restrict read access for the IOPaint process to the intended directories only.
  • Monitor logs for abnormal file access patterns that could indicate exploitation attempts.

Generated by OpenCVE AI on April 1, 2026 at 08:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Sanster
Sanster iopaint
Vendors & Products Sanster
Sanster iopaint

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 01 Apr 2026 07:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in Sanster IOPaint 1.5.3. Impacted is the function _get_file of the file iopaint/file_manager/file_manager.py of the component File Manager. Performing a manipulation of the argument filename results in path traversal. The attack is possible to be carried out remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title Sanster IOPaint File Manager file_manager.py _get_file path traversal
Weaknesses CWE-22
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-01T19:05:54.855Z

Reserved: 2026-03-31T16:20:10.685Z

Link: CVE-2026-5258

cve-icon Vulnrichment

Updated: 2026-04-01T19:05:51.521Z

cve-icon NVD

Status : Deferred

Published: 2026-04-01T07:16:02.930

Modified: 2026-04-24T18:12:06.580

Link: CVE-2026-5258

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:18:03Z

Weaknesses