ConvertXis a self-hosted online file converter. In versions prior to 0.17.0, the `POST /delete` endpoint uses a user-controlled `filename` value to construct a filesystem path and deletes it via `unlink` without sufficient validation. By supplying path traversal sequences (e.g., `../`), an attacker can delete arbitrary files outside the intended uploads directory, limited only by the permissions of the server process. Version 0.17.0 fixes the issue.

Project Subscriptions

Vendors Products
C4illin Subscribe
Convertx Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 12 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:c4illin:convertx:*:*:*:*:*:*:*:*

Wed, 28 Jan 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 28 Jan 2026 12:30:00 +0000

Type Values Removed Values Added
First Time appeared C4illin
C4illin convertx
Vendors & Products C4illin
C4illin convertx

Tue, 27 Jan 2026 21:30:00 +0000

Type Values Removed Values Added
Description ConvertXis a self-hosted online file converter. In versions prior to 0.17.0, the `POST /delete` endpoint uses a user-controlled `filename` value to construct a filesystem path and deletes it via `unlink` without sufficient validation. By supplying path traversal sequences (e.g., `../`), an attacker can delete arbitrary files outside the intended uploads directory, limited only by the permissions of the server process. Version 0.17.0 fixes the issue.
Title ConvertX Vulnerable to Arbitrary File Deletion via Path Traversal in `POST /delete`
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-28T15:14:23.019Z

Reserved: 2026-01-26T19:06:16.059Z

Link: CVE-2026-24741

cve-icon Vulnrichment

Updated: 2026-01-28T15:14:03.848Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-27T22:15:56.303

Modified: 2026-02-12T21:08:24.083

Link: CVE-2026-24741

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-01-28T12:22:04Z

Weaknesses