Static Web Server vulnerable to a symbolic link path traversal
Moderate severity
GitHub Reviewed
Published
Dec 8, 2025
in
static-web-server/static-web-server
•
Updated Dec 8, 2025
Description
Published to the GitHub Advisory Database
Dec 8, 2025
Reviewed
Dec 8, 2025
Last updated
Dec 8, 2025
Summary
Symbolic links (symlinks) could be used to access files or directories outside the intended web root folder.
Details
SWS generally does not prevent symlinks from escaping the web server’s root directory. Therefore, if a malicious actor gains access to the web server’s root directory, they could create symlinks to access other files outside the designated web root folder either by URL or via the directory listing.
PoC
e.g.
ln -s escape.txt $HOME/.bashrchttp://localhost/escape.txtin your browser.Impact
Any web server that runs with elevated privileges (e.g., root/administrator) and handles user-supplied file uploads is primarily impacted.
References