Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. psitransfer
  4. ›
  5. GHSA-533q-w4g6-5586

GHSA-533q-w4g6-5586: PsiTransfer: Upload PATCH path traversal can create `config.<NODE_ENV>.js` and lead to code execution on restart

April 16, 2026

The upload PATCH flow under /files/:uploadId validates the mounted request path using the still-encoded req.path, but the downstream tus handler later writes using the decoded req.params.uploadId. In deployments that use a supported custom PSITRANSFER_UPLOAD_DIR whose basename prefixes a startup-loaded JavaScript path, such as conf, an unauthenticated attacker can create config.<NODE_ENV>.js in the application root. The attacker-controlled file is then executed on the next process restart.

References

  • github.com/advisories/GHSA-533q-w4g6-5586
  • github.com/psi-4ward/psitransfer
  • github.com/psi-4ward/psitransfer/security/advisories/GHSA-533q-w4g6-5586

Code Behaviors & Features

Detect and mitigate GHSA-533q-w4g6-5586 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2.4.3

Fixed versions

  • 2.4.3

Solution

Upgrade to version 2.4.3 or above.

Impact 7.5 HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Source file

npm/psitransfer/GHSA-533q-w4g6-5586.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:18:12 +0000.