Home

Description

Voyager 1.3.0 contains a directory traversal vulnerability that allows attackers to access sensitive system files by manipulating the asset path parameter. Attackers can exploit the path parameter in /admin/voyager-assets to read arbitrary files like /etc/passwd and .env configuration files.

PUBLISHED Reserved 2026-02-10 | Published 2026-02-11 | Updated 2026-02-12 | Assigner VulnCheck




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

<= 1.3.0
affected

Credits

NgoAnhDuc finder

References

www.exploit-db.com/exploits/47875 (ExploitDB-47875) exploit

voyager.devdojo.com/ (Voyager Official Homepage) product

github.com/the-control-group/voyager/releases/tag/v1.3.0 (Voyager v1.3.0 Release) product

github.com/the-control-group/voyager/releases/tag/v1.2.7 (Voyager v1.2.7 Release) product

www.vulncheck.com/advisories/voyager-directory-traversal (VulnCheck Advisory: Voyager 1.3.0 - Directory Traversal) third-party-advisory

cve.org (CVE-2020-37214)

nvd.nist.gov (CVE-2020-37214)

Download JSON