ConvertXis a self-hosted online file converter. In versions prior to 0.17.0, the `POST /delete` endpoint uses a user-controlled `filename` value to construct a filesystem path and deletes it via `unlink` without sufficient validation. By supplying path traversal sequences (e.g., `../`), an attacker can delete arbitrary files outside the intended uploads directory, limited only by the permissions of the server process. Version 0.17.0 fixes the issue.
History

Tue, 27 Jan 2026 21:30:00 +0000

Type Values Removed Values Added
Description ConvertXis a self-hosted online file converter. In versions prior to 0.17.0, the `POST /delete` endpoint uses a user-controlled `filename` value to construct a filesystem path and deletes it via `unlink` without sufficient validation. By supplying path traversal sequences (e.g., `../`), an attacker can delete arbitrary files outside the intended uploads directory, limited only by the permissions of the server process. Version 0.17.0 fixes the issue.
Title ConvertX Vulnerable to Arbitrary File Deletion via Path Traversal in `POST /delete`
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-27T21:11:57.295Z

Reserved: 2026-01-26T19:06:16.059Z

Link: CVE-2026-24741

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-01-27T22:15:56.303

Modified: 2026-01-27T22:15:56.303

Link: CVE-2026-24741

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.