Vulnerability Description
A vulnerability was found in adenhq hive up to 0.11.0. This affects the function _read_events_tail of the file core/framework/server/routes_sessions.py of the component Delete Request Handler. Performing a manipulation results in path traversal. The attack may be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Adenhq | Hive | <= 0.11.0 |
Related Weaknesses (CWE)
References
- https://gist.github.com/YLChen-007/ff3ff201b05d13d41f949f86e9187bd2Third Party Advisory
- https://vuldb.com/submit/811276Third Party AdvisoryVDB Entry
- https://vuldb.com/vuln/364384Third Party AdvisoryVDB Entry
- https://vuldb.com/vuln/364384/ctiPermissions RequiredVDB Entry
FAQ
What is CVE-2026-8757?
CVE-2026-8757 is a vulnerability with a CVSS score of 7.3 (HIGH). A vulnerability was found in adenhq hive up to 0.11.0. This affects the function _read_events_tail of the file core/framework/server/routes_sessions.py of the component Delete Request Handler. Perform...
How severe is CVE-2026-8757?
CVE-2026-8757 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-8757?
Check the references section above for vendor advisories and patch information. Affected products include: Adenhq Hive.