CVE-2026-8757 PUBLISHED

adenhq hive Delete Request routes_sessions.py _read_events_tail path traversal

Assigner: VulDB
Reserved: 16.05.2026 Published: 17.05.2026 Updated: 17.05.2026

A vulnerability was found in adenhq hive up to 0.11.0. This affects the function _read_events_tail of the file core/framework/server/routes_sessions.py of the component Delete Request Handler. Performing a manipulation results in path traversal. The attack may be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
CVSS Score: 6.9

Product Status

Vendor adenhq
Product hive
Versions
  • Version 0.1 is affected
  • Version 0.2 is affected
  • Version 0.3 is affected
  • Version 0.4 is affected
  • Version 0.5 is affected
  • Version 0.6 is affected
  • Version 0.7 is affected
  • Version 0.8 is affected
  • Version 0.9 is affected
  • Version 0.10 is affected
  • Version 0.11.0 is affected

Credits

  • Eric-b (VulDB User) reporter
  • VulDB CNA Team coordinator

References

Problem Types

  • Path Traversal CWE