We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Lychee is a free photo-management tool. In versions starting from 6.6.6 to before 6.6.10, an attacker can leak local files including environment variables, nginx logs, other user's uploaded images, and configuration secrets due to a path traversal exploit in SecurePathController.php. This issue has been patched in version 6.6.10.
Reserved 2025-06-13 | Published 2025-06-18 | Updated 2025-06-18 | Assigner GitHub_MCWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
github.com/...Lychee/security/advisories/GHSA-6rj9-gm78-vhf9
github.com/...ommit/ae7270b7b47e4a284ea1f69d260e52d592711072
github.com/.../app/Http/Controllers/SecurePathController.php
Support options