CVE-2026-28429 PUBLISHED

Talishar: Critical Path Traversal in gameName Parameter

Assigner: GitHub_M
Reserved: 27.02.2026 Published: 06.03.2026 Updated: 06.03.2026

Talishar is a fan-made Flesh and Blood project. Prior to commit 6be3871, a Path Traversal vulnerability was identified in the gameName parameter. While the application's primary entry points implement input validation, the ParseGamestate.php component can be accessed directly as a standalone script. In this scenario, the absence of internal sanitization allows for directory traversal sequences (e.g., ../) to be processed, potentially leading to unauthorized file access. This issue has been patched in commit 6be3871.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS Score: 7.5

Product Status

Vendor Talishar
Product Talishar
Versions
  • Version < 6be3871a14c192d1fb8146cdbc76f29f27c1cf48 is affected

References

Problem Types

  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE