No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 28 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 28 Apr 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Browseroperator
Browseroperator browser-operator-core |
|
| Vendors & Products |
Browseroperator
Browseroperator browser-operator-core |
Tue, 28 Apr 2026 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A weakness has been identified in BrowserOperator browser-operator-core up to 0.6.0. Affected is the function startsWith of the file scripts/component_server/server.js. Executing a manipulation of the argument request.url can lead to path traversal. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet. | |
| Title | BrowserOperator browser-operator-core server.js startsWith path traversal | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-28T12:36:09.652Z
Reserved: 2026-04-27T17:04:04.203Z
Link: CVE-2026-7234
Updated: 2026-04-28T12:36:06.176Z
Status : Received
Published: 2026-04-28T07:16:04.247
Modified: 2026-04-28T07:16:04.247
Link: CVE-2026-7234
No data.
OpenCVE Enrichment
Updated: 2026-04-28T12:30:31Z