Allure 2 is the version 2.x branch of Allure Report, a multi-language test reporting tool. The Allure report generator prior to version 2.38.0 is vulnerable to an arbitrary file read via path traversal when processing test results. An attacker can craft a malicious result file (-result.json, -container.json, or .plist) that points an attachment source to a sensitive file on the host system. During report generation, Allure will resolve these paths and include the sensitive files in the final report. Version 2.38.0 fixes the issue.
References
Configurations
No configuration.
History
No history.
Information
Published : 2026-03-20 22:16
Updated : 2026-03-23 14:32
NVD link : CVE-2026-33166
Mitre link : CVE-2026-33166
CVE.ORG link : CVE-2026-33166
JSON object : View
Products Affected
No product.
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
