GHSA-8v2v-wjwg-vx6r

Suggest an improvement
Source
https://github.com/advisories/GHSA-8v2v-wjwg-vx6r
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-8v2v-wjwg-vx6r/GHSA-8v2v-wjwg-vx6r.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-8v2v-wjwg-vx6r
Related
Published
2026-02-06T18:56:20Z
Modified
2026-02-11T09:43:51.114179Z
Severity
  • 6.3 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
actix-files has a possible exposure of information vulnerability
Details

Summary

When passing a non-existing folder to the actix_files::Files::new() method causes the actix server to expose unexpected files.

Details

The actix-files library exposes a <code>Files</code> struct that configures an actix service to serve the files in a folder as static assets. Below you can find the signature of the <code>Files::new</code> method:

pub fn new&lt;T: Into<PathBuf>>(mount_path: &str, serve_from: T) -> Files

When the mount_path you pass to Files doesn't exist, it defaults to an empty path (Path::new()). When the service receives a HTTP request, it joins the request information with the empty path and calls canonicalize. Rust resolves this path as relative and returns any file that matches it.

This behavior causes the library to expose unexpected files when the folder is not present.

PoC

There is a working PoC on https://github.com/Angelmmiguel/actix-files-vuln, although the next steps can be followed to reproduce the issue

  1. Clone the https://github.com/actix/examples repository.
  2. Change your directory to the basics/static-files folder.
  3. Edit the src/main.rs file and change the line 13 to mount a non-existing folder:

    -        .service(Files::new("/images", "static/images/").show_files_listing())
    +        .service(Files::new("/images", "static/missing/").show_files_listing())
    
  4. Run the project with cargo run.

  5. Access the http://localhost:8080/images/Cargo.toml URL.

Impact

This is an exposure of information vulnerability. It affects anyone using the actix-files::Files library that mounts a non-existing folder for any reason.

Database specific
{
    "nvd_published_at": null,
    "github_reviewed_at": "2026-02-06T18:56:20Z",
    "severity": "MODERATE",
    "cwe_ids": [
        "CWE-200"
    ],
    "github_reviewed": true
}
References

Affected packages

crates.io / actix-files

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.6.10

Database specific

last_known_affected_version_range
"<= 0.6.9"
source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-8v2v-wjwg-vx6r/GHSA-8v2v-wjwg-vx6r.json"