Path traversal vulnerability exists in GROWI v7.5.0 and earlier, which may allow an attacker to execute arbitrary EJS templates on the server when an email server is running in GROWI.

Project Subscriptions

No data.

Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 11 May 2026 17:30:00 +0000

Type Values Removed Values Added
Title Path Traversal Allowing Arbitrary EJS Template Execution in GROWI

Mon, 11 May 2026 15:15:00 +0000

Type Values Removed Values Added
Description Path traversal vulnerability exists in GROWI v7.5.0 and earlier, which may allow an attacker to execute arbitrary EJS templates on the server when an email server is running in GROWI.
Weaknesses CWE-22
References
Metrics cvssV3_0

{'score': 7.2, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published:

Updated: 2026-05-11T12:43:07.550Z

Reserved: 2026-04-27T08:21:56.914Z

Link: CVE-2026-41951

cve-icon Vulnrichment

Updated: 2026-05-11T12:43:02.844Z

cve-icon NVD

Status : Received

Published: 2026-05-11T10:16:13.913

Modified: 2026-05-11T10:16:13.913

Link: CVE-2026-41951

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-11T17:15:40Z

Weaknesses