Salvo is a Rust web framework. Versions 0.39.0 through 0.89.2 have a Path Traversal and Access Control Bypass vulnerability in the salvo-proxy component. The vulnerability allows an unauthenticated external attacker to bypass proxy routing constraints and access unintended backend paths (e.g., protected endpoints or administrative dashboards). This issue stems from the encode_url_path function, which fails to normalize "../" sequences and inadvertently forwards them verbatim to the upstream server by not re-encoding the "." character. Version 0.89.3 contains a patch.
History

Tue, 24 Mar 2026 02:30:00 +0000

Type Values Removed Values Added
Description Salvo is a Rust web framework. Versions 0.39.0 through 0.89.2 have a Path Traversal and Access Control Bypass vulnerability in the salvo-proxy component. The vulnerability allows an unauthenticated external attacker to bypass proxy routing constraints and access unintended backend paths (e.g., protected endpoints or administrative dashboards). This issue stems from the encode_url_path function, which fails to normalize "../" sequences and inadvertently forwards them verbatim to the upstream server by not re-encoding the "." character. Version 0.89.3 contains a patch.
Title Salvo has a Path Traversal in salvo-proxy::encode_url_path allows API Gateway Bypass
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-23T23:40:39.886Z

Reserved: 2026-03-18T02:42:27.508Z

Link: CVE-2026-33242

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-24T00:16:29.670

Modified: 2026-03-24T00:16:29.670

Link: CVE-2026-33242

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.