CWE-44: Path Equivalence: 'file.name' (Internal Dot)
critical-riskThe product accepts path input in the form of internal dot ('file.ordir') without appropriate validation, which can lead to ambiguous path resolution and allow an attacker to traverse the file system to unintended locations or access arbitrary files.
Abstraction: Variant
Common Consequences
Confidentiality
→
Read Files or Directories
Real-World Examples (1)
| CVE | CVSS | EPSS | KEV |
|---|---|---|---|
| CVE-2025-24813 | 9.8 | 94.2% | Y |
72
/ 100
critical-risk
Active Threat
41/50 · Critical
Exploit Availability
31/50 · High