Description
A vulnerability was detected in p2r3 convert up to 6998584ace3e11db66dff0b423612a5cf91de75b. Affected is the function Bun.serve of the file buildCache.js of the component API. Performing a manipulation of the argument pathname results in path traversal. It is possible to initiate the attack remotely. The exploit is now public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-04-20
Score: 5.3 Medium
EPSS: n/a
KEV: No
Impact: Unauthorized file access
Action: Assess Impact
AI Analysis

Impact

The vulnerability is a path traversal flaw in the Bun.serve function of the p2r3 convert API, triggered by manipulating the pathname argument. By supplying specially crafted paths, an attacker can read any file on the filesystem that the process has permission to access. This can result in unauthorized disclosure of sensitive data, configuration files, or code. The weakness is identified as CWE‑22.

Affected Systems

p2r3 convert, a component that uses a rolling release model. All revisions before commit 6998584ace3e11db66dff0b423612a5cf91de75b are vulnerable. The affected file is buildCache.js within the API module. No discrete version numbers are available due to continuous delivery.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate severity. The exploit is available publicly and can be performed remotely through the exposed API. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog. Because the function accepts external input without proper sanitization, the attack vector is likely remote via a crafted HTTP request to Bun.serve.

Generated by OpenCVE AI on April 20, 2026 at 13:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Implement input validation to ensure pathname arguments are confined to allowed directories
  • Restrict access to the Bun.serve API to trusted clients or internal network only
  • Monitor and alert on anomalous file access attempts through the API

Generated by OpenCVE AI on April 20, 2026 at 13:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared P2r3
P2r3 convert
Vendors & Products P2r3
P2r3 convert
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 20 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in p2r3 convert up to 6998584ace3e11db66dff0b423612a5cf91de75b. Affected is the function Bun.serve of the file buildCache.js of the component API. Performing a manipulation of the argument pathname results in path traversal. It is possible to initiate the attack remotely. The exploit is now public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.
Title p2r3 convert API buildCache.js Bun.serve path traversal
Weaknesses CWE-22
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:P/I:N/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-20T14:58:24.131Z

Reserved: 2026-04-19T19:23:02.842Z

Link: CVE-2026-6636

cve-icon Vulnrichment

Updated: 2026-04-20T14:58:14.327Z

cve-icon NVD

Status : Received

Published: 2026-04-20T12:16:09.943

Modified: 2026-04-20T12:16:09.943

Link: CVE-2026-6636

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T14:57:49Z

Weaknesses