Path Traversal Vulnerability in p2r3 Convert API by Vendor
CVE-2026-6636
Key Information:
Badges
What is CVE-2026-6636?
A path traversal vulnerability has been identified in the p2r3 Convert API, specifically within the Bun.serve function of the buildCache.js file. This vulnerability is triggered by manipulating the pathname argument, allowing attackers to exploit the system remotely. The exploit has been made public, posing a potential risk to users of the affected versions. The vendor was notified of the issue but has not yet issued any response or corrective measures.
Affected Version(s)
convert 6998584ace3e11db66dff0b423612a5cf91de75b
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
