CVE-2026-33242

Salvo is a Rust web framework. Versions 0.39.0 through 0.89.2 have a Path Traversal and Access Control Bypass vulnerability in the salvo-proxy component. The vulnerability allows an unauthenticated external attacker to bypass proxy routing constraints and access unintended backend paths (e.g., protected endpoints or administrative dashboards). This issue stems from the encode_url_path function, which fails to normalize "../" sequences and inadvertently forwards them verbatim to the upstream server by not re-encoding the "." character. Version 0.89.3 contains a patch.
Configurations

Configuration 1 (hide)

cpe:2.3:a:salvo:salvo:*:*:*:*:*:rust:*:*

History

24 Mar 2026, 19:37

Type Values Removed Values Added
First Time Salvo salvo
Salvo
CPE cpe:2.3:a:salvo:salvo:*:*:*:*:*:rust:*:*
References () https://github.com/salvo-rs/salvo/commit/7bac30e6960355c58e358e402072d4a3e5c4e1bb#diff-e319bf7afcb577f7e9f4fb767005072f6335d23f306dd52e8c94f3d222610d02R20 - () https://github.com/salvo-rs/salvo/commit/7bac30e6960355c58e358e402072d4a3e5c4e1bb#diff-e319bf7afcb577f7e9f4fb767005072f6335d23f306dd52e8c94f3d222610d02R20 - Patch
References () https://github.com/salvo-rs/salvo/releases/tag/v0.89.3 - () https://github.com/salvo-rs/salvo/releases/tag/v0.89.3 - Product, Release Notes
References () https://github.com/salvo-rs/salvo/security/advisories/GHSA-f842-phm9-p4v4 - () https://github.com/salvo-rs/salvo/security/advisories/GHSA-f842-phm9-p4v4 - Exploit, Mitigation, Vendor Advisory

24 Mar 2026, 16:16

Type Values Removed Values Added
References () https://github.com/salvo-rs/salvo/security/advisories/GHSA-f842-phm9-p4v4 - () https://github.com/salvo-rs/salvo/security/advisories/GHSA-f842-phm9-p4v4 -
Summary
  • (es) Salvo es un framework web de Rust. Las versiones 0.39.0 a 0.89.2 tienen una vulnerabilidad de salto de ruta y omisión de control de acceso en el componente salvo-proxy. La vulnerabilidad permite a un atacante externo no autenticado omitir las restricciones de enrutamiento del proxy y acceder a rutas de backend no deseadas (p. ej., puntos finales protegidos o paneles administrativos). Este problema se origina en la función encode_url_path, que no normaliza las secuencias '../' y las reenvía inadvertidamente tal cual al servidor ascendente al no volver a codificar el carácter '.'. La versión 0.89.3 contiene un parche.

24 Mar 2026, 00:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-24 00:16

Updated : 2026-03-24 19:37


NVD link : CVE-2026-33242

Mitre link : CVE-2026-33242

CVE.ORG link : CVE-2026-33242


JSON object : View

Products Affected

salvo

  • salvo
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')