ConvertXis a self-hosted online file converter. In versions prior to 0.17.0, the `POST /delete` endpoint uses a user-controlled `filename` value to construct a filesystem path and deletes it via `unlink` without sufficient validation. By supplying path traversal sequences (e.g., `../`), an attacker can delete arbitrary files outside the intended uploads directory, limited only by the permissions of the server process. Version 0.17.0 fixes the issue.
Metrics
Affected Vendors & Products
References
History
Tue, 27 Jan 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ConvertXis a self-hosted online file converter. In versions prior to 0.17.0, the `POST /delete` endpoint uses a user-controlled `filename` value to construct a filesystem path and deletes it via `unlink` without sufficient validation. By supplying path traversal sequences (e.g., `../`), an attacker can delete arbitrary files outside the intended uploads directory, limited only by the permissions of the server process. Version 0.17.0 fixes the issue. | |
| Title | ConvertX Vulnerable to Arbitrary File Deletion via Path Traversal in `POST /delete` | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-27T21:11:57.295Z
Reserved: 2026-01-26T19:06:16.059Z
Link: CVE-2026-24741
No data.
Status : Received
Published: 2026-01-27T22:15:56.303
Modified: 2026-01-27T22:15:56.303
Link: CVE-2026-24741
No data.
OpenCVE Enrichment
No data.