CVE-2026-33242

Salvo is a Rust web framework. Versions 0.39.0 through 0.89.2 have a Path Traversal and Access Control Bypass vulnerability in the salvo-proxy component. The vulnerability allows an unauthenticated external attacker to bypass proxy routing constraints and access unintended backend paths (e.g., protected endpoints or administrative dashboards). This issue stems from the encode_url_path function, which fails to normalize "../" sequences and inadvertently forwards them verbatim to the upstream server by not re-encoding the "." character. Version 0.89.3 contains a patch.
Configurations

Configuration 1 (hide)

cpe:2.3:a:salvo:salvo:*:*:*:*:*:rust:*:*

History

No history.

Information

Published : 2026-03-24 00:16

Updated : 2026-03-24 19:37


NVD link : CVE-2026-33242

Mitre link : CVE-2026-33242

CVE.ORG link : CVE-2026-33242


JSON object : View

Products Affected

salvo

  • salvo
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')