{"api_version":"1","generated_at":"2026-04-24T00:21:38+00:00","cve":"CVE-2023-3348","urls":{"html":"https://cve.report/CVE-2023-3348","api":"https://cve.report/api/cve/CVE-2023-3348.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-3348","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-3348"},"summary":{"title":"CVE-2023-3348","description":"The Wrangler command line tool  (<=wrangler@3.1.0 or <=wrangler@2.20.1) was affected by a directory traversal vulnerability when running a local development server for Pages (wrangler pages dev command). This vulnerability enabled an attacker in the same network as the victim to connect to the local development server and access the victim's files present outside of the directory for the development server.","state":"PUBLIC","assigner":"cna@cloudflare.com","published_at":"2023-08-03 15:15:00","updated_at":"2023-08-29 10:15:00"},"problem_types":["CWE-22"],"metrics":[],"references":[{"url":"https://github.com/cloudflare/workers-sdk/security/advisories/GHSA-8c93-4hch-xgxp","name":"https://github.com/cloudflare/workers-sdk/security/advisories/GHSA-8c93-4hch-xgxp","refsource":"MISC","tags":[],"title":"Directory traversal vulnerability in Cloudflare Wrangler · Advisory · cloudflare/workers-sdk · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/cloudflare/workers-sdk","name":"https://github.com/cloudflare/workers-sdk","refsource":"MISC","tags":[],"title":"GitHub - cloudflare/workers-sdk: ⛅️ Home to Wrangler, the CLI for Cloudflare Workers®","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://developers.cloudflare.com/workers/wrangler/","name":"https://developers.cloudflare.com/workers/wrangler/","refsource":"MISC","tags":[],"title":"Wrangler (command line) · Cloudflare Workers docs","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-3348","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3348","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"3348","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cloudflare","cpe5":"wrangler","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"node.js","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-3348","ASSIGNER":"cna@cloudflare.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"The Wrangler command line tool  (<=wrangler@3.1.0 or <=wrangler@2.20.1) was affected by a directory traversal vulnerability when running a local development server for Pages (wrangler pages dev command). This vulnerability enabled an attacker in the same network as the victim to connect to the local development server and access the victim's files present outside of the directory for the development server.\n\n\n\n"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","cweId":"CWE-22"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Cloudflare","product":{"product_data":[{"product_name":"Wrangler","version":{"version_data":[{"version_value":"not down converted","x_cve_json_5_version_data":{"versions":[{"changes":[{"at":"3.1.1","status":"unaffected"}],"lessThan":"3.1.1","status":"affected","version":"3","versionType":"semver"},{"changes":[{"at":"2.20.1","status":"unaffected"}],"lessThan":"2.20.1","status":"affected","version":"2","versionType":"semver"}],"defaultStatus":"unaffected"}}]}}]}}]}},"references":{"reference_data":[{"url":"https://github.com/cloudflare/workers-sdk/security/advisories/GHSA-8c93-4hch-xgxp","refsource":"MISC","name":"https://github.com/cloudflare/workers-sdk/security/advisories/GHSA-8c93-4hch-xgxp"},{"url":"https://github.com/cloudflare/workers-sdk","refsource":"MISC","name":"https://github.com/cloudflare/workers-sdk"},{"url":"https://developers.cloudflare.com/workers/wrangler/","refsource":"MISC","name":"https://developers.cloudflare.com/workers/wrangler/"}]},"generator":{"engine":"Vulnogram 0.1.0-dev"},"source":{"discovery":"EXTERNAL"},"solution":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Upgrade to wrangler@3.1.1 or higher<br>For wrangler v2 upgrade to wrangler@2.20.1 or higher"}],"value":"Upgrade to wrangler@3.1.1 or higher\nFor wrangler v2 upgrade to wrangler@2.20.1 or higher"}],"credits":[{"lang":"en","value":"robocap42 (HackerOne researcher)"}],"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"ADJACENT_NETWORK","availabilityImpact":"NONE","baseScore":5.7,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","version":"3.1"}]}},"nvd":{"publishedDate":"2023-08-03 15:15:00","lastModifiedDate":"2023-08-29 10:15:00","problem_types":["CWE-22"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5.7,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.1,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:cloudflare:wrangler:*:*:*:*:*:node.js:*:*","versionEndExcluding":"3.1.1","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}