A path traversal vulnerability exists in httpdasm version...
        
  High severity
        
          Unreviewed
      
        Published
          Jul 23, 2025 
          to the GitHub Advisory Database
          •
          Updated Jul 23, 2025 
      
  
Description
        Published by the National Vulnerability Database
      Jul 23, 2025 
    
  
        Published to the GitHub Advisory Database
      Jul 23, 2025 
    
  
        Last updated
      Jul 23, 2025 
    
  
A path traversal vulnerability exists in httpdasm version 0.92, a lightweight Windows HTTP server, that allows unauthenticated attackers to read arbitrary files on the host system. By sending a specially crafted GET request containing a sequence of URL-encoded backslashes and directory traversal patterns, an attacker can escape the web root and access sensitive files outside of the intended directory.
References