CVE-2026-42351: pygeoapi Path Traversal Exposes Directories
The National Vulnerability Database reports CVE-2026-42351, a critical path traversal vulnerability affecting pygeoapi versions 0.23.0 through 0.23.2. This flaw, classified as CWE-22, resides in the STAC FileSystemProvider plugin. It allows unauthenticated attackers to expose directory contents.
The issue manifests when pygeoapi is deployed without a robust proxy or web front end capable of normalizing URLs with path traversal sequences (e.g., ..). Critically, it also requires a stac-collection resource to be defined in the configuration. The National Vulnerability Database assigns this a CVSS score of 7.5 (HIGH), underscoring the severity of unauthenticated information disclosure.
Defenders must recognize that this isn’t just a theoretical bug. Unauthenticated directory exposure can quickly lead to sensitive data leaks, reconnaissance advantages for attackers, and potentially further compromise. The patch is available in pygeoapi version 0.23.3. Update immediately.
What This Means For You
- If your organization uses pygeoapi, specifically versions 0.23.0 through 0.23.2, you are exposed to unauthenticated directory traversal via CVE-2026-42351. Patch to version 0.23.3 immediately. Furthermore, ensure your web front ends and proxies are configured to normalize URLs and strip any path traversal sequences before requests hit your application servers. This is a fundamental security hygiene point often overlooked.
Related ATT&CK Techniques
🛡️ Detection Rules
2 rules · 6 SIEM formats2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-42351: pygeoapi STAC FileSystemProvider Path Traversal
title: CVE-2026-42351: pygeoapi STAC FileSystemProvider Path Traversal
id: scw-2026-05-08-ai-1
status: experimental
level: high
description: |
This rule detects attempts to exploit CVE-2026-42351 by looking for requests to pygeoapi's STAC endpoint that contain path traversal sequences ('../'). This specific pattern targets the STAC FileSystemProvider plugin's vulnerability, which allows unauthenticated directory exposure when configured with 'stac-collection' resources and without a URL-normalizing proxy.
author: SCW Feed Engine (AI-generated)
date: 2026-05-08
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-42351/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/stac/collections/'
cs-uri|contains:
- '../'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-42351 | Path Traversal | pygeoapi versions 0.23.0 to before 0.23.3 |
| CVE-2026-42351 | Information Disclosure | pygeoapi STAC FileSystemProvider plugin |
| CVE-2026-42351 | Path Traversal | raw string path concatenation vulnerability in STAC FileSystemProvider |
| CVE-2026-42351 | Misconfiguration | pygeoapi deployed without a proxy or web front end that normalizes URLs with '..' |
| CVE-2026-42351 | Misconfiguration | pygeoapi configuration with a resource of type 'stac-collection' defined |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 09, 2026 at 02:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.