Description

Emissary is a P2P based data-driven workflow engine. Prior to 8.39.0, the configuration API endpoint (/api/configuration/{name}) validated configuration names using a blacklist approach that checked for \, /, .., and trailing .. This could potentially be bypassed using URL-encoded variants, double-encoding, or Unicode normalization to achieve path traversal and read configuration files outside the intended directory. This vulnerability is fixed in 8.39.0.

INFO

Published Date :

2026-04-07T15:57:41.496Z

Last Modified :

2026-04-07T15:57:41.496Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-35583 vulnerability.

Vendors Products
Nationalsecurityagency
  • Emissary
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-35583.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact