CVE-2024-35219
HIGHCVSS v3
8.3
HIGH
EPSS Score
51.7%
exploit probability
CISA KEV
No
known exploited
Exploitation
—
SSVC status
Description
OpenAPI Generator allows generation of API client libraries (SDK generation), server stubs, documentation and configuration automatically given an OpenAPI Spec. Prior to version 7.6.0, attackers can exploit a path traversal vulnerability to read and delete files and folders from an arbitrary, writable directory as anyone can set the output folder when submitting the request via the `outputFolder` option. The issue was fixed in version 7.6.0 by removing the usage of the `outputFolder` option. No
Technical Details
- CVSS v3 Vector
- 3.1
- Published
- 5/27/2024
- Last Modified
- 4/15/2026
Frequently Asked Questions
What is CVE-2024-35219?
OpenAPI Generator allows generation of API client libraries (SDK generation), server stubs, documentation and configuration automatically given an OpenAPI Spec. Prior to version 7.6.0, attackers can exploit a path traversal vulnerability to read and delete files and folders from an arbitrary, writable directory as anyone can set the output folder when submitting the request via the `outputFolder` option. The issue was fixed in version 7.6.0 by removing the usage of the `outputFolder` option. No
Is CVE-2024-35219 actively exploited?
Active exploitation of CVE-2024-35219 has not been confirmed. The EPSS score is 51.7%, indicating the estimated probability of exploitation in the next 30 days.
What is the CVSS score for CVE-2024-35219?
CVE-2024-35219 has a CVSS v3 base score of 8.3 (HIGH severity), with vector string 3.1.
Is CVE-2024-35219 affecting your environment?
Use isMalicious to check if any of your IPs or domains are associated with this vulnerability's IOCs.