We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Bugsink is a self-hosted error tracking service. In versions 1.4.2 and below, 1.5.0 through 1.5.4, 1.6.0 through 1.6.3, and 1.7.0 through 1.7.3, ingestion paths construct file locations directly from untrusted event_id input without validation. A specially crafted event_id can result in paths outside the intended directory, potentially allowing file overwrite or creation in arbitrary locations. Submitting such input requires access to a valid DSN, potentially exposing them. If Bugsink runs in a container, the effect is confined to the container’s filesystem. In non-containerized setups, the overwrite may affect other parts of the system accessible to that user. This is fixed in versions 1.4.3, 1.5.5, 1.6.4 and 1.7.4.
Reserved 2025-07-21 | Published 2025-07-30 | Updated 2025-07-30 | Assigner GitHub_MCWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
github.com/...ugsink/security/advisories/GHSA-q78p-g86f-jg6q
github.com/...ommit/1001726f4389e982c486cdd5fa81941cb46cfc33
github.com/...ommit/211ddf76758c808c095b5f836c363f148d934d21
github.com/...ommit/2c41fbe3881bdea83399a7f9fdc8cff198ae089f
github.com/...ommit/53cf1a17a3e96f7c83c7451fd56f980a09d0c9b0
github.com/...ommit/55a155003d0b416ea008c5e7dcde85130ad21d9b
github.com/...ommit/b94aa8a5c96ce8cdd9711b6beb4e518264993ac2
github.com/...ommit/c341687bd655543730c812db35c29199f788be6b
github.com/...ommit/c87217bd565122ba70af90436e3ab2cd9bee658f
Support options