GHSA-64hm-gfwq-jppw

Suggest an improvement
Source
https://github.com/advisories/GHSA-64hm-gfwq-jppw
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-64hm-gfwq-jppw/GHSA-64hm-gfwq-jppw.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-64hm-gfwq-jppw
Aliases
  • CVE-2026-33166
Published
2026-03-18T19:53:59Z
Modified
2026-03-25T19:47:25.661519Z
Severity
  • 8.6 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N CVSS Calculator
Summary
Allure Report has an Arbitrary File Read via Path Traversal in Attachment Processing (Allure 1, Allure 2, and XCTest Readers)
Details

Summary

The Allure report generator is vulnerable to an arbitrary file read via path traversal when processing test results. An attacker can craft a malicious result file (-result.json, -container.json, or .plist) that points an attachment source to a sensitive file on the host system. During report generation, Allure will resolve these paths and include the sensitive files in the final report.

Details

The vulnerability exists in several plugins where attachment paths are resolved using unvalidated user input. The code uses Path.resolve() without normalizing the path or checking if the resulting file remains within the intended results directory.

Affected Files and Lines:

Allure2Plugin.java (Line 264): final Path attachmentFile = source.resolve(attachment.getSource());

Allure1Plugin.java (Line 328): final Path attachmentFile = source.resolve(attachment.getSource());

XcTestPlugin.java (Line 181): attachments.resolve(String.format("Screenshot_%s.%s", uuid, ext))

Since resolve() allows absolute paths or ../ sequences to escape the base directory, any file readable by the process can be exfiltrated.

PoC

1) Create a directory named allure-results.

2) Create a file malicious-result.json inside it:

{
  "uuid": "poc-traversal",
  "name": "Path Traversal PoC",
  "status": "passed",
  "attachments": [
    {
      "name": "Sensitive Data",
      "source": "../../../../../../../../../../../etc/passwd",
      "type": "text/plain"
    }
  ]
}

3) run allure generate allure-results -o allure-report

4) The content of /etc/passwd will now be present in allure-report/data/attachments/.

Impact

This is a High Severity vulnerability. In CI/CD environments (GitHub Actions, Jenkins), an attacker submitting a Pull Request can exfiltrate server secrets, cloud credentials, or environment configuration files stored on the runner disk. It also may affect custom Allure web services where users can upload results, allowing them to read arbitrary files from the server's filesystem. Allure TestOps is not affected.

Database specific
{
    "nvd_published_at": "2026-03-20T22:16:28Z",
    "github_reviewed_at": "2026-03-18T19:53:59Z",
    "cwe_ids": [
        "CWE-22"
    ],
    "severity": "HIGH",
    "github_reviewed": true
}
References

Affected packages

Maven / io.qameta.allure:allure-generator

Package

Name
io.qameta.allure:allure-generator
View open source insights on deps.dev
Purl
pkg:maven/io.qameta.allure/allure-generator

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.38.0

Affected versions

2.*
2.0-BETA8
2.0.0
2.0.1
2.1.1
2.2.0
2.3
2.3.1
2.3.2
2.3.4
2.4.1
2.5.0
2.8.0
2.8.1
2.9.0
2.10.0
2.11.0
2.12.0
2.12.1
2.13.0
2.13.1
2.13.2
2.13.3
2.13.4
2.13.5
2.13.6
2.13.7
2.13.8
2.13.9
2.13.10
2.14.0
2.15.0
2.16.0
2.16.1
2.17.0
2.17.1
2.17.2
2.17.3
2.18.0
2.18.1
2.19.0
2.20.0
2.20.1
2.21.0
2.22.0
2.22.1
2.22.2
2.22.3
2.22.4
2.23.0
2.23.1
2.24.0
2.24.1
2.25.0
2.26.0
2.27.0
2.28.0
2.29.0
2.30.0
2.31.0
2.32.0
2.32.2
2.33.0
2.34.0
2.34.1
2.35.0
2.35.1
2.36.0
2.37.0

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-64hm-gfwq-jppw/GHSA-64hm-gfwq-jppw.json"
last_known_affected_version_range
"<= 2.37.0"