Back to list

pygeoapi 0.23.x: Path Traversal in STAC FileSystemProvider — CVE-2026-42351

GitHub · GitHub · CVE-2026-42351

ID
CVE-2026-42351
Date
Updated
Activity
Source
GitHub
Vendor
GitHub
Threat
high
CVSS
7.5
EPSS
0.00094

Summary

### Impact A raw string path concatenation vulnerability in pygeoapi's STAC FileSystemProvider plugin can allow for requests to STAC collection based collections to expose directories without authentication. The issue manifests when pygeoapi is deployed without a proxy or web front end that would normalize URLs with `..` values, along with a resource of type `stac-collection` defined in configuration. ### Patches…

Product

pip: pygeoapi

What to do

General, cautious steps (verify details in the official source):

  • Prioritize patching or mitigation immediately (treat as actively risky).
  • Identify affected product versions in your inventory and verify whether you are impacted.
  • Apply vendor patches/updates or recommended mitigations as soon as available.
  • Read the official advisory for exact affected versions and remediation steps.

Official advisory

Related advisories