No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 20 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
P2r3
P2r3 convert |
|
| Vendors & Products |
P2r3
P2r3 convert |
|
| Metrics |
ssvc
|
Mon, 20 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was detected in p2r3 convert up to 6998584ace3e11db66dff0b423612a5cf91de75b. Affected is the function Bun.serve of the file buildCache.js of the component API. Performing a manipulation of the argument pathname results in path traversal. It is possible to initiate the attack remotely. The exploit is now public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | p2r3 convert API buildCache.js Bun.serve path traversal | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-20T14:58:24.131Z
Reserved: 2026-04-19T19:23:02.842Z
Link: CVE-2026-6636
Updated: 2026-04-20T14:58:14.327Z
Status : Received
Published: 2026-04-20T12:16:09.943
Modified: 2026-04-20T12:16:09.943
Link: CVE-2026-6636
No data.
OpenCVE Enrichment
Updated: 2026-04-20T14:57:49Z