CVE-2026-28676
OpenSift: Insufficient path containment checks in storage helpers could allow path traversal-style file operations
CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th
OpenSift is an AI study tool that sifts through large datasets using semantic search and generative AI. Prior to version 1.6.3-alpha, multiple storage helpers used path construction patterns that did not uniformly enforce base-directory containment. This created path-injection risk in file read/write/delete flows if malicious path-like values were introduced. This issue has been patched in version 1.6.3-alpha.
| CWE | CWE-22 |
| Vendor | opensift |
| Product | opensift |
| Published | Mar 6, 2026 |
| Last Updated | Mar 9, 2026 |
Stay Ahead of the Next One
Get instant alerts for opensift opensift
Be the first to know when new high vulnerabilities affecting opensift opensift are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Affected Versions
OpenSift / OpenSift
< 1.6.3-alpha
References
github.com: https://github.com/OpenSift/OpenSift/security/advisories/GHSA-ww4m-c7hv-2rqv github.com: https://github.com/OpenSift/OpenSift/pull/67 github.com: https://github.com/OpenSift/OpenSift/commit/1126e0a503876056a68a434e19f64158a5a4840b github.com: https://github.com/OpenSift/OpenSift/commit/de99b9c github.com: https://github.com/OpenSift/OpenSift/releases/tag/v1.6.3-alpha