CVE-2026-21440

Source
https://cve.org/CVERecord?id=CVE-2026-21440
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-21440.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-21440
Aliases
Published
2026-01-02T19:02:18.393Z
Modified
2026-01-13T20:07:04.027869Z
Severity
  • 9.2 (Critical) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N CVSS Calculator
Summary
AdonisJS Path Traversal in Multipart File Handling
Details

AdonisJS is a TypeScript-first web framework. A Path Traversal vulnerability in AdonisJS multipart file handling may allow a remote attacker to write arbitrary files to arbitrary locations on the server filesystem. This impacts @adonisjs/bodyparser through version 10.1.1 and 11.x prerelease versions prior to 11.0.0-next.6. This issue has been patched in @adonisjs/bodyparser versions 10.1.2 and 11.0.0-next.6.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-22"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/21xxx/CVE-2026-21440.json"
}
References

Affected packages

Git / github.com/adonisjs/bodyparser

Affected ranges

Type
GIT
Repo
https://github.com/adonisjs/bodyparser
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "fixed": "10.1.2"
        }
    ]
}
Type
GIT
Repo
https://github.com/adonisjs/bodyparser
Events
Database specific
{
    "versions": [
        {
            "introduced": "11.0.0-next.0"
        },
        {
            "fixed": "11.0.0-next.6"
        }
    ]
}

Affected versions

2.*
2.0.5
v1.*
v1.0.0
v1.0.1
v1.0.2
v1.0.3
v1.0.4
v1.0.5
v1.0.6
v1.0.7
v1.0.8
v10.*
v10.0.0
v10.0.0-0
v10.0.0-1
v10.0.0-2
v10.0.0-3
v10.0.1
v10.0.2
v10.0.3
v10.1.0
v10.1.1
v11.*
v11.0.0-next.0
v11.0.0-next.1
v11.0.0-next.2
v11.0.0-next.3
v11.0.0-next.4
v11.0.0-next.5
v2.*
v2.0.0
v2.0.1
v2.0.3
v2.0.4
v2.0.6
v2.0.7
v2.0.8
v2.0.9
v3.*
v3.0.0
v3.0.1
v3.0.10
v3.0.11
v3.0.12
v3.0.13
v3.0.14
v3.0.15
v3.0.16
v3.0.2
v3.0.3
v3.0.4
v3.0.5
v3.0.6
v3.0.7
v3.0.8
v3.0.9
v3.1.0
v3.2.0
v3.2.1
v3.2.2
v3.2.3
v3.2.4
v3.2.5
v3.2.6
v3.2.7
v4.*
v4.0.0
v4.0.1
v4.0.2
v4.0.3
v4.0.4
v4.0.5
v4.0.6
v5.*
v5.0.0
v5.0.1
v5.0.2
v5.0.3
v5.0.4
v5.0.5
v5.0.6
v5.0.7
v5.0.8
v5.1.0
v6.*
v6.0.0
v7.*
v7.0.0
v7.0.1
v7.1.0
v7.1.1
v7.1.2
v7.1.3
v7.1.4
v7.1.5
v8.*
v8.0.0
v8.0.1
v8.0.2
v8.1.0
v8.1.1
v8.1.2
v8.1.3
v8.1.4
v8.1.5
v8.1.6
v8.1.7
v8.1.8
v8.1.9
v9.*
v9.0.0-0
v9.0.1-0
v9.0.2-0
v9.0.3-0
v9.1.0-0
v9.1.1-0
v9.2.0-0
v9.2.1-0
v9.2.2-0
v9.3.0-0
v9.3.1-0
v9.3.2-0
v9.3.2-1
v9.3.2-2
v9.3.2-3
v9.3.2-4
v9.3.2-5
v9.3.2-6
v9.3.2-7
v9.3.2-8

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-21440.json"