CVE-2026-25766

Source
https://cve.org/CVERecord?id=CVE-2026-25766
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-25766.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-25766
Aliases
Downstream
Related
Published
2026-02-19T15:49:02.402Z
Modified
2026-03-04T22:29:01.699261Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
Echo has a Windows path traversal via backslash in middleware.Static default filesystem
Details

Echo is a Go web framework. In versions 5.0.0 through 5.0.2 on Windows, Echo’s middleware.Static using the default filesystem allows path traversal via backslashes, enabling unauthenticated remote file read outside the static root. In middleware/static.go, the requested path is unescaped and normalized with path.Clean (URL semantics). path.Clean does not treat \ as a path separator, so ..\ sequences remain in the cleaned path. The resulting path is then passed to currentFS.Open(...). When the filesystem is left at the default (nil), Echo uses defaultFS which calls os.Open (echo.go:792). On Windows, os.Open treats \ as a path separator and resolves ..\, allowing traversal outside the static root. Version 5.0.3 fixes the issue.

Database specific
{
    "cwe_ids": [
        "CWE-22"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/25xxx/CVE-2026-25766.json"
}
References

Affected packages

Git / github.com/labstack/echo

Affected ranges

Type
GIT
Repo
https://github.com/labstack/echo
Events

Affected versions

v5.*
v5.0.0
v5.0.1
v5.0.2

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-25766.json"