Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-4q61-ksfc-aqf2
Vulnerability ID VCID-4q61-ksfc-aqf2
Aliases CVE-2021-40525
GHSA-c38m-7h53-g9v4
Summary Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Apache James ManagedSieve implementation alongside with the file storage for sieve scripts is vulnerable to path traversal, allowing reading and writing any file. This vulnerability had been patched in Apache James and higher. We recommend the upgrade. Distributed and Cassandra based products are also not impacted.
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
epss 0.02773 https://api.first.org/data/v1/epss?cve=CVE-2021-40525
epss 0.02773 https://api.first.org/data/v1/epss?cve=CVE-2021-40525
epss 0.02773 https://api.first.org/data/v1/epss?cve=CVE-2021-40525
epss 0.02773 https://api.first.org/data/v1/epss?cve=CVE-2021-40525
epss 0.02773 https://api.first.org/data/v1/epss?cve=CVE-2021-40525
epss 0.02773 https://api.first.org/data/v1/epss?cve=CVE-2021-40525
epss 0.02773 https://api.first.org/data/v1/epss?cve=CVE-2021-40525
epss 0.02773 https://api.first.org/data/v1/epss?cve=CVE-2021-40525
epss 0.02773 https://api.first.org/data/v1/epss?cve=CVE-2021-40525
epss 0.02773 https://api.first.org/data/v1/epss?cve=CVE-2021-40525
epss 0.02773 https://api.first.org/data/v1/epss?cve=CVE-2021-40525
epss 0.02773 https://api.first.org/data/v1/epss?cve=CVE-2021-40525
epss 0.02773 https://api.first.org/data/v1/epss?cve=CVE-2021-40525
epss 0.02773 https://api.first.org/data/v1/epss?cve=CVE-2021-40525
cvssv3.1_qr CRITICAL https://github.com/advisories/GHSA-c38m-7h53-g9v4
cvssv3.1 9.1 https://github.com/apache/james-project
generic_textual CRITICAL https://github.com/apache/james-project
cvssv3.1 9.1 https://nvd.nist.gov/vuln/detail/CVE-2021-40525
generic_textual CRITICAL https://nvd.nist.gov/vuln/detail/CVE-2021-40525
cvssv3.1 9.1 https://www.openwall.com/lists/oss-security/2022/01/04/4
generic_textual CRITICAL https://www.openwall.com/lists/oss-security/2022/01/04/4
cvssv3.1 9.1 http://www.openwall.com/lists/oss-security/2022/01/04/4
generic_textual CRITICAL http://www.openwall.com/lists/oss-security/2022/01/04/4
cvssv3.1 9.1 http://www.openwall.com/lists/oss-security/2022/02/07/1
generic_textual CRITICAL http://www.openwall.com/lists/oss-security/2022/02/07/1
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N Found at https://github.com/apache/james-project
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2021-40525
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N Found at https://www.openwall.com/lists/oss-security/2022/01/04/4
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N Found at http://www.openwall.com/lists/oss-security/2022/01/04/4
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N Found at http://www.openwall.com/lists/oss-security/2022/02/07/1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.85983
EPSS Score 0.02773
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:49:13.362460+00:00 GitLab Importer Import https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.jamesframework/james/CVE-2021-40525.yml 38.0.0