CVE-2026-1616
Published: 29 January 2026
Summary
CVE-2026-1616 is a high-severity Path Traversal (CWE-22) vulnerability in Redhat Open Security Issue Management. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 6.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Validates pathnames and filenames to prevent traversal outside intended directories.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Path traversal in public-facing web app (nginx) enables remote unauthenticated file access (T1190) and direct local data disclosure (T1005).
NVD Description
The $uri$args concatenation in nginx configuration file present in Open Security Issue Management (OSIM) prior v2025.9.0 allows path traversal attacks via query parameters.
Deeper analysisAI
CVE-2026-1616 is a path traversal vulnerability (CWE-22) affecting Open Security Issue Management (OSIM) versions prior to v2025.9.0. The flaw arises from improper concatenation of the $uri and $args variables in the nginx configuration file, enabling attackers to manipulate query parameters to traverse directories and access unintended files.
With a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), the vulnerability is exploitable remotely over the network with low complexity, requiring no privileges or user interaction. Unauthenticated attackers can send crafted HTTP requests containing malicious query parameters to achieve directory traversal, resulting in high-impact unauthorized disclosure of confidential data without affecting integrity or availability.
The GitHub pull request at https://github.com/RedHatProductSecurity/osim/pull/615 provides the patch addressing this issue, and upgrading to OSIM v2025.9.0 or later mitigates the vulnerability.
Details
- CWE(s)