AdonisJS Path Traversal Vulnerability Affects File Handling
CVE-2026-21440

9.2CRITICAL

Key Information:

Vendor

Adonisjs

Status
Vendor
CVE Published:
2 January 2026

Badges

πŸ“ˆ TrendedπŸ“ˆ Score: 1,840πŸ‘Ύ Exploit Exists🟑 Public PoC

What is CVE-2026-21440?

CVE-2026-21440 is a serious vulnerability affecting AdonisJS, which is a web framework built primarily with TypeScript. This framework is designed to enable developers to create web applications efficiently, offering a variety of features for building robust server-side applications. The vulnerability lies within the multipart file handling functionality of the framework, specifically in the @adonisjs/bodyparser package up to version 10.1.1 and the 11.x prerelease versions before 11.0.0-next.6. The nature of the vulnerability is a Path Traversal flaw, which could allow a remote attacker to manipulate file paths, enabling them to write arbitrary files to uncontrolled locations within the server’s filesystem. This breach can severely impact an organization by exposing sensitive information, allowing for unauthorized access, or possibly leading to further exploitation of the system.

Potential impact of CVE-2026-21440

  1. Arbitrary File Writing: The vulnerability allows attackers to write files to arbitrary locations, which could potentially be exploited to overwrite critical system files, disrupt applications, or create backdoors for future access.

  2. Data Breaches and Leakage: By being able to manipulate file paths, an attacker could gain access to sensitive data and thus lead to data breaches, risking customer privacy and leading to compliance issues for organizations.

  3. System Compromise: This vulnerability could pave the way for further attacks, as compromised files could facilitate additional malicious activities, including executing arbitrary code or deploying malware within the organization's infrastructure.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

core < 10.1.2 < 10.1.2

core >= 11.0.0-next.0, < 11.0.0-next.6 < 11.0.0-next.0, 11.0.0-next.6

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
9.2
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • πŸ“ˆ

    Vulnerability started trending

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.