Vulnerability Description
A vulnerability has been found in DataLinkDC dinky up to 1.2.5. The affected element is the function getProjectDir of the file dinky-admin/src/main/java/org/dinky/utils/GitRepository.java of the component Project Name Handler. Such manipulation of the argument projectName leads to path traversal. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dinky | Dinky | <= 1.2.5 |
Related Weaknesses (CWE)
References
- https://github.com/AnalogyC0de/public_exp/issues/5ExploitIssue TrackingThird Party Advisory
- https://github.com/AnalogyC0de/public_exp/issues/5#issue-3935000629ExploitIssue TrackingThird Party Advisory
- https://vuldb.com/?ctiid.347409Permissions RequiredThird Party AdvisoryVDB Entry
- https://vuldb.com/?id.347409Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.757586Third Party AdvisoryVDB Entry
FAQ
What is CVE-2026-3051?
CVE-2026-3051 is a vulnerability with a CVSS score of 6.3 (MEDIUM). A vulnerability has been found in DataLinkDC dinky up to 1.2.5. The affected element is the function getProjectDir of the file dinky-admin/src/main/java/org/dinky/utils/GitRepository.java of the compo...
How severe is CVE-2026-3051?
CVE-2026-3051 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-3051?
Check the references section above for vendor advisories and patch information. Affected products include: Dinky Dinky.