CVE-2026-33528

GoDoxy is a reverse proxy and container orchestrator for self-hosters. Prior to version 0.27.5, the file content API endpoint at `/api/v1/file/content` is vulnerable to path traversal. The `filename` query parameter is passed directly to `path.Join(common.ConfigBasePath, filename)` where `ConfigBasePath = "config"` (a relative path). No sanitization or validation is applied beyond checking that the field is non-empty (`binding:"required"`). An authenticated attacker can use `../` sequences to read or write files outside the intended `config/` directory, including TLS private keys, OAuth refresh tokens, and any file accessible to the container's UID. Version 0.27.5 fixes the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:godoxy:godoxy:*:*:*:*:*:go:*:*

History

02 Apr 2026, 18:17

Type Values Removed Values Added
First Time Godoxy godoxy
Godoxy
References () https://github.com/yusing/godoxy/commit/a541d75bb50f1b542c096d8bc8082c3549f5c059 - () https://github.com/yusing/godoxy/commit/a541d75bb50f1b542c096d8bc8082c3549f5c059 - Patch
References () https://github.com/yusing/godoxy/releases/tag/v0.27.5 - () https://github.com/yusing/godoxy/releases/tag/v0.27.5 - Product, Release Notes
References () https://github.com/yusing/godoxy/security/advisories/GHSA-4753-cmc8-8j9v - () https://github.com/yusing/godoxy/security/advisories/GHSA-4753-cmc8-8j9v - Exploit, Mitigation, Vendor Advisory
CPE cpe:2.3:a:godoxy:godoxy:*:*:*:*:*:go:*:*

27 Mar 2026, 15:16

Type Values Removed Values Added
Summary
  • (es) GoDoxy es un proxy inverso y orquestador de contenedores para autoalojadores. Antes de la versión 0.27.5, el endpoint de la API de contenido de archivos en '/api/v1/file/content' es vulnerable a salto de ruta. El parámetro de consulta 'filename' se pasa directamente a 'path.Join(common.ConfigBasePath, filename)' donde 'ConfigBasePath = "config"' (una ruta relativa). No se aplica ninguna sanitización ni validación más allá de verificar que el campo no esté vacío ('binding:"required"'). Un atacante autenticado puede usar secuencias '../' para leer o escribir archivos fuera del directorio 'config/' previsto, incluyendo claves privadas TLS, tokens de actualización de OAuth y cualquier archivo accesible al UID del contenedor. La versión 0.27.5 soluciona el problema.
References () https://github.com/yusing/godoxy/security/advisories/GHSA-4753-cmc8-8j9v - () https://github.com/yusing/godoxy/security/advisories/GHSA-4753-cmc8-8j9v -

26 Mar 2026, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-26 20:16

Updated : 2026-04-02 18:17


NVD link : CVE-2026-33528

Mitre link : CVE-2026-33528

CVE.ORG link : CVE-2026-33528


JSON object : View

Products Affected

godoxy

  • godoxy
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')