{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-23485","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-01-13T15:47:41.628Z","datePublished":"2026-03-23T20:50:02.880Z","dateUpdated":"2026-03-24T15:13:17.335Z"},"containers":{"cna":{"title":"Blinko: Unauthorized Path Traversal File Enumeration - music-metadata","problemTypes":[{"descriptions":[{"cweId":"CWE-22","lang":"en","description":"CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","type":"CWE"}]}],"metrics":[{"cvssV4_0":{"attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"LOW","vulnIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","baseScore":6.9,"baseSeverity":"MEDIUM","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N","version":"4.0"}}],"references":[{"name":"https://github.com/blinkospace/blinko/security/advisories/GHSA-5x64-pmfq-pw7q","tags":["x_refsource_CONFIRM"],"url":"https://github.com/blinkospace/blinko/security/advisories/GHSA-5x64-pmfq-pw7q"},{"name":"https://github.com/blinkospace/blinko/commit/9d6fa80a3e11a99886f90e048657443335fd3e7d","tags":["x_refsource_MISC"],"url":"https://github.com/blinkospace/blinko/commit/9d6fa80a3e11a99886f90e048657443335fd3e7d"},{"name":"https://github.com/blinkospace/blinko/releases/tag/1.8.4","tags":["x_refsource_MISC"],"url":"https://github.com/blinkospace/blinko/releases/tag/1.8.4"}],"affected":[{"vendor":"blinkospace","product":"blinko","versions":[{"version":"< 1.8.4","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-03-23T20:50:02.880Z"},"descriptions":[{"lang":"en","value":"Blinko is an AI-powered card note-taking project. Prior to version 1.8.4, the filePath parameter accepts path traversal sequences, allowing enumeration of file existence on the server via different error responses. This issue has been patched in version 1.8.4."}],"source":{"advisory":"GHSA-5x64-pmfq-pw7q","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-24T14:41:45.162698Z","id":"CVE-2026-23485","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-24T15:13:17.335Z"}}]}}