CVE-2026-28429
EUVD-2026-998206.03.2026, 05:16
Talishar is a fan-made Flesh and Blood project. Prior to commit 6be3871, a Path Traversal vulnerability was identified in the gameName parameter. While the application's primary entry points implement input validation, the ParseGamestate.php component can be accessed directly as a standalone script. In this scenario, the absence of internal sanitization allows for directory traversal sequences (e.g., ../) to be processed, potentially leading to unauthorized file access. This issue has been patched in commit 6be3871.
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| talishar | talishar | 𝑥 < 2026-02-22 |
𝑥
= Vulnerable software versions