ConvertXis a self-hosted online file converter. In versions prior to 0.17.0, the `POST /delete` endpoint uses a user-controlled `filename` value to construct a filesystem path and deletes it via `unlink` without sufficient validation. By supplying path traversal sequences (e.g., `../`), an attacker can delete arbitrary files outside the intended uploads directory, limited only by the permissions of the server process. Version 0.17.0 fixes the issue.
Metrics
Affected Vendors & Products
References
History
Wed, 28 Jan 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 28 Jan 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
C4illin
C4illin convertx |
|
| Vendors & Products |
C4illin
C4illin convertx |
Tue, 27 Jan 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ConvertXis a self-hosted online file converter. In versions prior to 0.17.0, the `POST /delete` endpoint uses a user-controlled `filename` value to construct a filesystem path and deletes it via `unlink` without sufficient validation. By supplying path traversal sequences (e.g., `../`), an attacker can delete arbitrary files outside the intended uploads directory, limited only by the permissions of the server process. Version 0.17.0 fixes the issue. | |
| Title | ConvertX Vulnerable to Arbitrary File Deletion via Path Traversal in `POST /delete` | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-01-27T21:11:57.295Z
Updated: 2026-01-28T15:14:23.019Z
Reserved: 2026-01-26T19:06:16.059Z
Link: CVE-2026-24741
Updated: 2026-01-28T15:14:03.848Z
Status : Awaiting Analysis
Published: 2026-01-27T22:15:56.303
Modified: 2026-01-29T16:31:35.700
Link: CVE-2026-24741
No data.