๐Ÿ” CVE Alert

CVE-2026-44225

CRITICAL 9.3

Pulpy: Incomplete filesystem sandbox in pulpy.fs bridge allows packaged web apps to read arbitrary user files

CVSS Score
9.3
EPSS Score
0.0%
EPSS Percentile
0th

Pulpy is a lightweight, cross-platform desktop application packager for web apps. Prior to 0.1.1, Pulpy injects a pulpy.fs JavaScript API into every packaged web application, giving it access to the host filesystem. A validateFsPath() function is supposed to sandbox this access, but its blocklist is incomplete. Any web app packaged with Pulpy can read and write arbitrary files in the user's home directory โ€” including ~/.ssh/id_rsa, ~/.aws/credentials, and ~/Library/Keychains/. This vulnerability is fixed in 0.1.1.

CWE CWE-22 CWE-284
Vendor enesgkky
Product pulpy
Published May 12, 2026
Stay Ahead of the Next One

Get instant alerts for enesgkky pulpy

Be the first to know when new critical vulnerabilities affecting enesgkky pulpy are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
None

Affected Versions

enesgkky / Pulpy
< 0.1.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/enesgkky/Pulpy/security/advisories/GHSA-h9q2-w73v-g7hf