CVE-2026-6636
p2r3 convert API buildCache.js Bun.serve path traversal
CVSS Score
4.3
EPSS Score
0.0%
EPSS Percentile
0th
A vulnerability was detected in p2r3 convert up to 6998584ace3e11db66dff0b423612a5cf91de75b. Affected is the function Bun.serve of the file buildCache.js of the component API. Performing a manipulation of the argument pathname results in path traversal. It is possible to initiate the attack remotely. The exploit is now public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.
| CWE | CWE-22 |
| Vendor | p2r3 |
| Product | convert |
| Published | Apr 20, 2026 |
Stay Ahead of the Next One
Get instant alerts for p2r3 convert
Be the first to know when new medium vulnerabilities affecting p2r3 convert are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
p2r3 / convert
6998584ace3e11db66dff0b423612a5cf91de75b
References
Credits
๐ davidgilmore (VulDB User) VulDB CNA Team