Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://growi.co.jp/news/44/ |
|
| https://jvn.jp/jp/JVN38788367/ |
|
Mon, 11 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Path traversal vulnerability exists in GROWI v7.5.0 and earlier, which may allow an attacker to execute arbitrary EJS templates on the server when an email server is running in GROWI. | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2026-05-11T12:43:07.550Z
Reserved: 2026-04-27T08:21:56.914Z
Link: CVE-2026-41951
Updated: 2026-05-11T12:43:02.844Z
Status : Received
Published: 2026-05-11T10:16:13.913
Modified: 2026-05-11T10:16:13.913
Link: CVE-2026-41951
No data.
OpenCVE Enrichment
No data.