Vulnerability Description
Sharp is a content management framework built for Laravel as a package. Versions prior to 9.20.0 have a path traversal vulnerability in the FileUtil class. The application fails to sanitize file extensions properly, allowing path separators to be passed into the storage layer. In `src/Utils/FileUtil.php`, the `FileUtil::explodeExtension()` function extracts a file's extension by splitting the filename at the last dot. This issue has been patched in version 9.20.0 by properly sanitizing the extension using `pathinfo(PATHINFO_EXTENSION)` instead of `strrpos()`, alongside applying strict regex replacements to both the base name and the extension.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Code16 | Sharp | < 9.20.0 |
Related Weaknesses (CWE)
References
- https://github.com/code16/sharp/pull/715Issue TrackingPatch
- https://github.com/code16/sharp/security/advisories/GHSA-9ffq-6457-8958Vendor Advisory
FAQ
What is CVE-2026-33686?
CVE-2026-33686 is a vulnerability with a CVSS score of 8.8 (HIGH). Sharp is a content management framework built for Laravel as a package. Versions prior to 9.20.0 have a path traversal vulnerability in the FileUtil class. The application fails to sanitize file exte...
How severe is CVE-2026-33686?
CVE-2026-33686 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-33686?
Check the references section above for vendor advisories and patch information. Affected products include: Code16 Sharp.