๐Ÿ” CVE Alert

CVE-2020-37041

HIGH 7.5

OpenCTI 3.3.1 - Directory Traversal

CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
0th

OpenCTI 3.3.1 is vulnerable to a directory traversal attack via the static/css endpoint. An unauthenticated attacker can read arbitrary files from the filesystem by sending crafted GET requests with path traversal sequences (e.g., '../') in the URL. For example, requesting /static/css//../../../../../../../../etc/passwd returns the contents of /etc/passwd. This vulnerability was discovered by Raif Berkay Dincel and confirmed on Linux Mint and Windows 10.

CWE CWE-22
Vendor filigran
Product opencti
Published Jan 30, 2026
Last Updated Mar 5, 2026
Stay Ahead of the Next One

Get instant alerts for filigran opencti

Be the first to know when new high vulnerabilities affecting filigran opencti are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None

Affected Versions

Filigran / OpenCTI
3.3.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
exploit-db.com: https://www.exploit-db.com/exploits/48595 opencti.io: https://www.opencti.io/ github.com: https://github.com/OpenCTI-Platform/opencti vulncheck.com: https://www.vulncheck.com/advisories/opencti-directory-traversal

Credits

Raif Berkay Dincel