Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
5.3
DataLinkDC dinky: Unsecured Path Traversal in Project Handler
CVE-2026-3051
Summary
An attacker can exploit a weakness in DataLinkDC dinky versions 1.2.5 and earlier, potentially allowing them to access unauthorized files or directories. This is a concern because it could be used to compromise sensitive data. To protect against this, we recommend updating to the latest version of DataLinkDC dinky.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| dinky | dinky | <= 1.2.5 | – |
Original title
A vulnerability has been found in DataLinkDC dinky up to 1.2.5. The affected element is the function getProjectDir of the file dinky-admin/src/main/java/org/dinky/utils/GitRepository.java of the co...
Original description
A vulnerability has been found in DataLinkDC dinky up to 1.2.5. The affected element is the function getProjectDir of the file dinky-admin/src/main/java/org/dinky/utils/GitRepository.java of the component Project Name Handler. Such manipulation of the argument projectName leads to path traversal. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
nvd CVSS2.0
6.5
nvd CVSS3.1
7.6
nvd CVSS4.0
5.3
Vulnerability type
CWE-22
Path Traversal
- https://github.com/AnalogyC0de/public_exp/issues/5 Exploit Issue Tracking Third Party Advisory
- https://github.com/AnalogyC0de/public_exp/issues/5#issue-3935000629 Exploit Issue Tracking Third Party Advisory
- https://vuldb.com/?ctiid.347409 Permissions Required Third Party Advisory VDB Entry
- https://vuldb.com/?id.347409 Third Party Advisory VDB Entry
- https://vuldb.com/?submit.757586 Third Party Advisory VDB Entry
Published: 24 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026