Description
Emissary is a P2P based data-driven workflow engine. Prior to 8.39.0, the configuration API endpoint (/api/configuration/{name}) validated configuration names using a blacklist approach that checked for \, /, .., and trailing .. This could potentially be bypassed using URL-encoded variants, double-encoding, or Unicode normalization to achieve path traversal and read configuration files outside the intended directory. This vulnerability is fixed in 8.39.0.
INFO
Published Date :
2026-04-07T15:57:41.496Z
Last Modified :
2026-04-07T15:57:41.496Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-35583 vulnerability.
| Vendors | Products |
|---|---|
| Nationalsecurityagency |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-35583.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact