Vulnerability Description
Heym before 0.0.21 contains a path traversal vulnerability in the file upload endpoint that allows authenticated users to write attacker-controlled files to arbitrary locations by supplying a crafted filename with traversal sequences. Attackers can exploit the unvalidated filename parameter in the upload_file() handler to bypass path restrictions and write, read, or delete files outside the intended storage directory.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://github.com/heymrun/heym/commit/835843e6d2bf7d018cbb8e50f28f0426eaa20c84
- https://github.com/heymrun/heym/pull/92
- https://github.com/heymrun/heym/releases/tag/v0.0.21
- https://www.vulncheck.com/advisories/heym-path-traversal-file-upload-via-upload-
- https://github.com/heymrun/heym/pull/92
FAQ
What is CVE-2026-45225?
CVE-2026-45225 is a vulnerability with a CVSS score of 7.6 (HIGH). Heym before 0.0.21 contains a path traversal vulnerability in the file upload endpoint that allows authenticated users to write attacker-controlled files to arbitrary locations by supplying a crafted ...
How severe is CVE-2026-45225?
CVE-2026-45225 has been rated HIGH with a CVSS base score of 7.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-45225?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.