Directory Traversal vulnerability in Beam beta9 v.0.1.521 allows a remote attacker to obtain sensitive information via the joinCleanPath function.
History

Mon, 02 Feb 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Beam
Beam beta9
CPEs cpe:2.3:a:beam:beta9:0.1.521:*:*:*:*:*:*:*
Vendors & Products Beam
Beam beta9

Wed, 28 Jan 2026 15:00:00 +0000

Type Values Removed Values Added
Description Directory Traversal vulnerability in Beam beta9 v.0.1.552 allows a remote attacker to obtain sensitive information via the joinCleanPath function Directory Traversal vulnerability in Beam beta9 v.0.1.521 allows a remote attacker to obtain sensitive information via the joinCleanPath function.

Mon, 26 Jan 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Amazon
Amazon aws Sdk Php
Beam-cloud
Beam-cloud beta9
Vendors & Products Amazon
Amazon aws Sdk Php
Beam-cloud
Beam-cloud beta9

Sun, 25 Jan 2026 06:30:00 +0000


Thu, 22 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-22
Metrics cvssV3_1

{'score': 6, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 22 Jan 2026 16:00:00 +0000

Type Values Removed Values Added
Description Directory Traversal vulnerability in Beam beta9 v.0.1.552 allows a remote attacker to obtain sensitive information via the joinCleanPath function
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2026-01-22T00:00:00.000Z

Updated: 2026-01-28T14:40:20.538Z

Reserved: 2026-01-09T00:00:00.000Z

Link: CVE-2025-69820

cve-icon Vulnrichment

Updated: 2026-01-22T16:48:50.684Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-22T16:16:07.820

Modified: 2026-02-02T20:33:56.877

Link: CVE-2025-69820

cve-icon Redhat

No data.