No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 30 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 30 Mar 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Elecv2
Elecv2 elecv2p |
|
| Vendors & Products |
Elecv2
Elecv2 elecv2p |
Sat, 28 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability has been found in elecV2 elecV2P up to 3.8.3. Impacted is the function path.join of the file /store/:key. The manipulation of the argument URL leads to path traversal. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet. | |
| Title | elecV2 elecV2P :key path.join path traversal | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-03-30T15:55:15.514Z
Reserved: 2026-03-27T14:11:38.349Z
Link: CVE-2026-5013
Updated: 2026-03-30T15:55:11.576Z
Status : Awaiting Analysis
Published: 2026-03-28T20:16:16.470
Modified: 2026-03-30T13:26:07.647
Link: CVE-2026-5013
No data.
OpenCVE Enrichment
Updated: 2026-03-30T06:58:52Z