{"id":"CVE-2023-40826","details":"An issue in pf4j pf4j v.3.9.0 and before allows a remote attacker to obtain sensitive information and execute arbitrary code via the zippluginPath parameter.","aliases":["GHSA-3r28-rgp9-qgv4"],"modified":"2026-04-10T05:02:36.488203Z","published":"2023-08-28T22:15:09.433Z","references":[{"type":"REPORT","url":"https://github.com/pf4j/pf4j/issues/536"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/pf4j/pf4j","events":[{"introduced":"0"},{"last_affected":"361fb8b9b31bd64c696105ef0b56ee253aa4ca0c"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"3.9.0"}]}}],"versions":["release-0.1","release-0.10.0","release-0.11.0","release-0.12.0","release-0.13.0","release-0.13.1","release-0.2","release-0.3","release-0.7.0","release-0.7.1","release-0.9.0","release-1.0.0","release-1.1.0","release-1.2.0","release-1.3.0","release-2.0.0","release-2.1.0","release-2.2.0","release-2.3.0","release-2.4.0","release-2.5.0","release-2.6.0","release-3.0.0","release-3.0.1","release-3.1.0","release-3.2.0","release-3.3.0","release-3.3.1","release-3.4.0","release-3.4.1","release-3.5.0","release-3.6.0","release-3.7.0","release-3.8.0","release-3.9.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-40826.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}