CVE-2024-35219

HIGH

CVSS v3

8.3

HIGH

EPSS Score

51.7%

exploit probability

CISA KEV

No

known exploited

Exploitation

SSVC status

Description

OpenAPI Generator allows generation of API client libraries (SDK generation), server stubs, documentation and configuration automatically given an OpenAPI Spec. Prior to version 7.6.0, attackers can exploit a path traversal vulnerability to read and delete files and folders from an arbitrary, writable directory as anyone can set the output folder when submitting the request via the `outputFolder` option. The issue was fixed in version 7.6.0 by removing the usage of the `outputFolder` option. No

Technical Details

CVSS v3 Vector
3.1
Published
5/27/2024
Last Modified
4/15/2026

Frequently Asked Questions

What is CVE-2024-35219?

OpenAPI Generator allows generation of API client libraries (SDK generation), server stubs, documentation and configuration automatically given an OpenAPI Spec. Prior to version 7.6.0, attackers can exploit a path traversal vulnerability to read and delete files and folders from an arbitrary, writable directory as anyone can set the output folder when submitting the request via the `outputFolder` option. The issue was fixed in version 7.6.0 by removing the usage of the `outputFolder` option. No

Is CVE-2024-35219 actively exploited?

Active exploitation of CVE-2024-35219 has not been confirmed. The EPSS score is 51.7%, indicating the estimated probability of exploitation in the next 30 days.

What is the CVSS score for CVE-2024-35219?

CVE-2024-35219 has a CVSS v3 base score of 8.3 (HIGH severity), with vector string 3.1.

Is CVE-2024-35219 affecting your environment?

Use isMalicious to check if any of your IPs or domains are associated with this vulnerability's IOCs.