Intel

AIKIDO-2026-10124

rulesync is vulnerable to Path Traversal

Path Traversal Pre-CVE
Found by Aikido Intel before public disclosure or CVE publication.

44

Medium Risk

This Affects:

JSrulesync
0.68.0 - 6.0.0
Fixed in 6.1.0

TL;DR

Affected versions of this package are vulnerable to path traversal when processing nested rule files, due to insufficient validation of relative file paths. An attacker could craft paths containing traversal sequences to access files outside the intended directory. The patched version adds explicit path traversal checks after path resolution, ensuring that rule files remain within the expected root directory and preventing unauthorized file access.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

rulesync is vulnerable to Path Traversal in versions 0.68.0 - 6.0.0.

How to fix this

Upgrade the rulesync library to the patch version.

Background Info