Directory Traversal vulnerability in Beam beta9 v.0.1.521 allows a remote attacker to obtain sensitive information via the joinCleanPath function.
References
| Link | Resource |
|---|---|
| https://github.com/aws/aws-sdk-php/security/advisories/GHSA-557v-xcg6-rm5m | Not Applicable |
| https://github.com/beam-cloud/beta9/blob/c1cd75e813cf7d53e916157d920099e89ef45caa/pkg/abstractions/volume/multipart.go#L45 | Product |
| https://github.com/ryotaromatsui/CVEs/tree/main/CVE-2025-69820 | Exploit Third Party Advisory |
Configurations
History
02 Feb 2026, 20:33
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Beam
Beam beta9 |
|
| CPE | cpe:2.3:a:beam:beta9:0.1.521:*:*:*:*:*:*:* | |
| References | () https://github.com/aws/aws-sdk-php/security/advisories/GHSA-557v-xcg6-rm5m - Not Applicable | |
| References | () https://github.com/beam-cloud/beta9/blob/c1cd75e813cf7d53e916157d920099e89ef45caa/pkg/abstractions/volume/multipart.go#L45 - Product | |
| References | () https://github.com/ryotaromatsui/CVEs/tree/main/CVE-2025-69820 - Exploit, Third Party Advisory |
28 Jan 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) Directory Traversal vulnerability in Beam beta9 v.0.1.521 allows a remote attacker to obtain sensitive information via the joinCleanPath function. |
25 Jan 2026, 07:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
22 Jan 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.0 |
| CWE | CWE-22 |
22 Jan 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-22 16:16
Updated : 2026-02-02 20:33
NVD link : CVE-2025-69820
Mitre link : CVE-2025-69820
CVE.ORG link : CVE-2025-69820
JSON object : View
Products Affected
beam
- beta9
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
