OpenSift is an AI study tool that sifts through large datasets using semantic search and generative AI. Prior to version 1.6.3-alpha, multiple storage helpers used path construction patterns that did not uniformly enforce base-directory containment. This created path-injection risk in file read/write/delete flows if malicious path-like values were introduced. This issue has been patched in version 1.6.3-alpha.
References
| Link | Resource |
|---|---|
| https://github.com/OpenSift/OpenSift/commit/1126e0a503876056a68a434e19f64158a5a4840b | Patch |
| https://github.com/OpenSift/OpenSift/commit/de99b9c | Patch |
| https://github.com/OpenSift/OpenSift/pull/67 | Issue Tracking Patch |
| https://github.com/OpenSift/OpenSift/releases/tag/v1.6.3-alpha | Release Notes |
| https://github.com/OpenSift/OpenSift/security/advisories/GHSA-ww4m-c7hv-2rqv | Vendor Advisory Patch |
Configurations
History
No history.
Information
Published : 2026-03-06 05:16
Updated : 2026-03-18 13:02
NVD link : CVE-2026-28676
Mitre link : CVE-2026-28676
CVE.ORG link : CVE-2026-28676
JSON object : View
Products Affected
opensift
- opensift
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
