OliveTin gives access to predefined shell commands from a web interface. Prior to 3000.11.2, when the saveLogs feature is enabled, OliveTin persists execution log entries to disk. The filename used for these log files is constructed in part from the user-supplied UniqueTrackingId field in the StartAction API request. This value is not validated or sanitized before being used in a file path, allowing an attacker to use directory traversal sequences (e.g., ../../../) to write files to arbitrary locations on the filesystem. This vulnerability is fixed in 3000.11.2.

Project Subscriptions

Vendors Products
Olivetin Subscribe
Olivetin Subscribe
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-364q-w7vh-vhpc OliveTin's unsafe parsing of UniqueTrackingId can be used to write files
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 11 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Olivetin
Olivetin olivetin
Vendors & Products Olivetin
Olivetin olivetin

Wed, 11 Mar 2026 01:00:00 +0000

Type Values Removed Values Added
Title OliveTin has unsafe parsing of UniqueTrackingId can be used to write files OliveTin's unsafe parsing of UniqueTrackingId can be used to write files

Tue, 10 Mar 2026 21:30:00 +0000

Type Values Removed Values Added
Description OliveTin gives access to predefined shell commands from a web interface. Prior to 3000.11.2, when the saveLogs feature is enabled, OliveTin persists execution log entries to disk. The filename used for these log files is constructed in part from the user-supplied UniqueTrackingId field in the StartAction API request. This value is not validated or sanitized before being used in a file path, allowing an attacker to use directory traversal sequences (e.g., ../../../) to write files to arbitrary locations on the filesystem. This vulnerability is fixed in 3000.11.2.
Title OliveTin has unsafe parsing of UniqueTrackingId can be used to write files
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 8.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:L'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-11T15:19:29.025Z

Reserved: 2026-03-09T17:41:56.075Z

Link: CVE-2026-31817

cve-icon Vulnrichment

Updated: 2026-03-11T15:10:53.190Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-10T22:16:19.167

Modified: 2026-03-11T13:52:47.683

Link: CVE-2026-31817

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-11T11:39:26Z

Weaknesses