Search for vulnerabilities
Vulnerability details: VCID-zwfx-pswj-aaac
Vulnerability ID VCID-zwfx-pswj-aaac
Aliases CVE-2022-41722
Summary A path traversal vulnerability exists in filepath.Clean on Windows. On Windows, the filepath.Clean function could transform an invalid path such as "a/../c:/b" into the valid path "c:\b". This transformation of a relative (if invalid) path into an absolute path could enable a directory traversal attack. After fix, the filepath.Clean function transforms this path into the relative (but still invalid) path ".\c:\b".
Status Published
Exploitability 0.5
Weighted Severity 7.1
Risk 3.5
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3 7.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41722.json
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00119 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00119 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00119 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00119 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00169 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00169 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00169 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00169 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00169 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00169 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00169 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00169 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00169 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00169 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00169 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.00169 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
epss 0.0027 https://api.first.org/data/v1/epss?cve=CVE-2022-41722
ssvc Track https://go.dev/cl/468123
ssvc Track https://go.dev/cl/468123
ssvc Track https://go.dev/issue/57274
ssvc Track https://go.dev/issue/57274
cvssv3.1 7.5 https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E
generic_textual HIGH https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E
ssvc Track https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E
cvssv3 7.5 https://nvd.nist.gov/vuln/detail/CVE-2022-41722
cvssv3.1 7.5 https://nvd.nist.gov/vuln/detail/CVE-2022-41722
ssvc Track https://pkg.go.dev/vuln/GO-2023-1568
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41722.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-07T17:58:38Z/ Found at https://go.dev/cl/468123

Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-07T17:58:38Z/ Found at https://go.dev/cl/468123

Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-07T17:58:38Z/ Found at https://go.dev/issue/57274

Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-07T17:58:38Z/ Found at https://go.dev/issue/57274
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-07T17:58:38Z/ Found at https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2022-41722
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2022-41722
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-07T17:58:38Z/ Found at https://pkg.go.dev/vuln/GO-2023-1568
Exploit Prediction Scoring System (EPSS)
Percentile 0.21511
EPSS Score 0.00083
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.