Home

Description

A vulnerability was found in adenhq hive up to 0.11.0. This affects the function _read_events_tail of the file core/framework/server/routes_sessions.py of the component Delete Request Handler. Performing a manipulation results in path traversal. The attack may be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

PUBLISHED Reserved 2026-05-16 | Published 2026-05-17 | Updated 2026-05-17 | Assigner VulDB




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
HIGH: 7.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
HIGH: 7.3CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
7.5AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR

Problem types

Path Traversal

Product status

0.1
affected

0.2
affected

0.3
affected

0.4
affected

0.5
affected

0.6
affected

0.7
affected

0.8
affected

0.9
affected

0.10
affected

0.11.0
affected

Timeline

2026-05-16:Advisory disclosed
2026-05-16:VulDB entry created
2026-05-16:VulDB entry last update

Credits

Eric-b (VulDB User) reporter

VulDB CNA Team coordinator

References

vuldb.com/vuln/364384 (VDB-364384 | adenhq hive Delete Request routes_sessions.py _read_events_tail path traversal) vdb-entry technical-description

vuldb.com/vuln/364384/cti (VDB-364384 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/submit/811276 (Submit #811276 | adenhq hive latest Path Traversal (CWE-22)) third-party-advisory

gist.github.com/YLChen-007/ff3ff201b05d13d41f949f86e9187bd2 exploit

cve.org (CVE-2026-8757)

nvd.nist.gov (CVE-2026-8757)

Download JSON