Directory Traversal vulnerability in Beam beta9 v.0.1.521 allows a remote attacker to obtain sensitive information via the joinCleanPath function.
References
| Link | Resource |
|---|---|
| https://github.com/aws/aws-sdk-php/security/advisories/GHSA-557v-xcg6-rm5m | Not Applicable |
| https://github.com/beam-cloud/beta9/blob/c1cd75e813cf7d53e916157d920099e89ef45caa/pkg/abstractions/volume/multipart.go#L45 | Product |
| https://github.com/ryotaromatsui/CVEs/tree/main/CVE-2025-69820 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-01-22 16:16
Updated : 2026-02-02 20:33
NVD link : CVE-2025-69820
Mitre link : CVE-2025-69820
CVE.ORG link : CVE-2025-69820
JSON object : View
Products Affected
beam
- beta9
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
