Description
A vulnerability was identified in eghuzefa engineer-your-data up to 0.1.3. This vulnerability affects the function read_file/write_file/list_files/file_inf of the file src/server.py. The manipulation of the argument WORKSPACE_PATH leads to path traversal. The attack may be initiated remotely. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-04-28
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote path traversal allows unauthorized file access
Action: Check for Update
AI Analysis

Impact

The flaw resides in the read_file, write_file, list_files, and file_inf functions of src/server.py, where the WORKSPACE_PATH argument can be manipulated to perform path traversal. A remote attacker can supply a crafted value and read, write, or list arbitrary files on the host. The vulnerability is a classic CWE‑22 path traversal flaw that can be exploited to gain unauthorized access to sensitive files. The description indicates the exploit is publicly available and may be used remotely via manipulation of the WORKSPACE_PATH parameter.

Affected Systems

The vendor eghuzefa provides the engineer‑your‑data project. Versions up to 0.1.3 are affected. No further product variants or patch levels are listed, so any deployment using 0.1.3 or earlier in the repository is vulnerable.

Risk and Exploitability

The CVSS score of 6.9 indicates a moderate impact. The EPSS score is not available, and the vulnerability is not listed in CISA KEV, suggesting it is not a currently recognized high‑profile exploit. The description indicates the exploit is publicly available and may be used remotely through manipulation of the WORKSPACE_PATH parameter. Attackers could trigger the flaw via the exposed interfaces of the server, potentially retrieving sensitive files or disrupting service.

Generated by OpenCVE AI on April 28, 2026 at 19:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade engineer‑your‑data to a version newer than 0.1.3 that fixes the path traversal issue.
  • Validate the WORKSPACE_PATH argument against a defined base directory before processing any file operations.
  • Limit network access to the server to reduce the attack surface if the vulnerability is exploited.

Generated by OpenCVE AI on April 28, 2026 at 19:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Apr 2026 04:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 28 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Eghuzefa
Eghuzefa engineer-your-data
Vendors & Products Eghuzefa
Eghuzefa engineer-your-data

Tue, 28 Apr 2026 02:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in eghuzefa engineer-your-data up to 0.1.3. This vulnerability affects the function read_file/write_file/list_files/file_inf of the file src/server.py. The manipulation of the argument WORKSPACE_PATH leads to path traversal. The attack may be initiated remotely. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.
Title eghuzefa engineer-your-data server.py file_inf path traversal
Weaknesses CWE-22
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Eghuzefa Engineer-your-data
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-28T12:37:51.857Z

Reserved: 2026-04-27T15:09:56.092Z

Link: CVE-2026-7214

cve-icon Vulnrichment

Updated: 2026-04-28T12:37:48.011Z

cve-icon NVD

Status : Deferred

Published: 2026-04-28T02:16:08.960

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-7214

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T19:45:07Z

Weaknesses