CVE-2026-42351
pygeoapi: Path Traversal in STAC FileSystemProvider
CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
0th
pygeoapi is a Python server implementation of the OGC API suite of standards. From version 0.23.0 to before version 0.23.3, a raw string path concatenation vulnerability in pygeoapi's STAC FileSystemProvider plugin can allow for requests to STAC collection based collections to expose directories without authentication. The issue manifests when pygeoapi is deployed without a proxy or web front end that would normalize URLs with .. values, along with a resource of type stac-collection defined in configuration. This issue has been patched in version 0.23.3.
| CWE | CWE-22 |
| Vendor | geopython |
| Product | pygeoapi |
| Published | May 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for geopython pygeoapi
Be the first to know when new high vulnerabilities affecting geopython pygeoapi are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Affected Versions
geopython / pygeoapi
>= 0.23.0, < 0.23.3