ConvertXis a self-hosted online file converter. In versions prior to 0.17.0, the `POST /delete` endpoint uses a user-controlled `filename` value to construct a filesystem path and deletes it via `unlink` without sufficient validation. By supplying path traversal sequences (e.g., `../`), an attacker can delete arbitrary files outside the intended uploads directory, limited only by the permissions of the server process. Version 0.17.0 fixes the issue.
References
| Link | Resource |
|---|---|
| https://github.com/C4illin/ConvertX/commit/7a936bdc0463936463616381ca257b13babc5e77 | Patch |
| https://github.com/C4illin/ConvertX/security/advisories/GHSA-w372-w6cr-45jp | Exploit Vendor Advisory |
Configurations
History
12 Feb 2026, 21:08
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:c4illin:convertx:*:*:*:*:*:*:*:* | |
| First Time |
C4illin
C4illin convertx |
|
| References | () https://github.com/C4illin/ConvertX/commit/7a936bdc0463936463616381ca257b13babc5e77 - Patch | |
| References | () https://github.com/C4illin/ConvertX/security/advisories/GHSA-w372-w6cr-45jp - Exploit, Vendor Advisory |
27 Jan 2026, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-27 22:15
Updated : 2026-02-12 21:08
NVD link : CVE-2026-24741
Mitre link : CVE-2026-24741
CVE.ORG link : CVE-2026-24741
JSON object : View
Products Affected
c4illin
- convertx
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
