ConvertXis a self-hosted online file converter. In versions prior to 0.17.0, the `POST /delete` endpoint uses a user-controlled `filename` value to construct a filesystem path and deletes it via `unlink` without sufficient validation. By supplying path traversal sequences (e.g., `../`), an attacker can delete arbitrary files outside the intended uploads directory, limited only by the permissions of the server process. Version 0.17.0 fixes the issue.
References
| Link | Resource |
|---|---|
| https://github.com/C4illin/ConvertX/commit/7a936bdc0463936463616381ca257b13babc5e77 | Patch |
| https://github.com/C4illin/ConvertX/security/advisories/GHSA-w372-w6cr-45jp | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-01-27 22:15
Updated : 2026-02-12 21:08
NVD link : CVE-2026-24741
Mitre link : CVE-2026-24741
CVE.ORG link : CVE-2026-24741
JSON object : View
Products Affected
c4illin
- convertx
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
