๐Ÿ” CVE Alert

CVE-2026-6636

MEDIUM 4.3

p2r3 convert API buildCache.js Bun.serve path traversal

CVSS Score
4.3
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability was detected in p2r3 convert up to 6998584ace3e11db66dff0b423612a5cf91de75b. Affected is the function Bun.serve of the file buildCache.js of the component API. Performing a manipulation of the argument pathname results in path traversal. It is possible to initiate the attack remotely. The exploit is now public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.

CWE CWE-22
Vendor p2r3
Product convert
Published Apr 20, 2026
Stay Ahead of the Next One

Get instant alerts for p2r3 convert

Be the first to know when new medium vulnerabilities affecting p2r3 convert are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

p2r3 / convert
6998584ace3e11db66dff0b423612a5cf91de75b

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/358270 vuldb.com: https://vuldb.com/vuln/358270/cti vuldb.com: https://vuldb.com/submit/793436 github.com: https://github.com/Dave-gilmore-aus/security-advisories/blob/main/convert-advisory

Credits

๐Ÿ” davidgilmore (VulDB User) VulDB CNA Team