Description

Sharp is a content management framework built for Laravel as a package. Versions prior to 9.20.0 have a path traversal vulnerability in the FileUtil class. The application fails to sanitize file extensions properly, allowing path separators to be passed into the storage layer. In `src/Utils/FileUtil.php`, the `FileUtil::explodeExtension()` function extracts a file's extension by splitting the filename at the last dot. This issue has been patched in version 9.20.0 by properly sanitizing the extension using `pathinfo(PATHINFO_EXTENSION)` instead of `strrpos()`, alongside applying strict regex replacements to both the base name and the extension.

INFO

Published Date :

2026-03-26T21:54:25.294Z

Last Modified :

2026-03-27T13:59:50.752Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-33686 vulnerability.

Vendors Products
Code16
  • Sharp
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-33686.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact