Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2026-35583

Emissary is a P2P based data-driven workflow engine. Prior to 8.39.0, the configuration API endpoint (/api/configuration/{name}) validated configuration names using a blacklist approach that checked for \, /, .., and trailing .. This could potentially be bypassed using URL-encoded variants, double-encoding, or Unicode normalization to achieve path traversal and read configuration files outside the intended directory. This vulnerability is fixed in 8.39.0.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 15.4%
CVSS Severity
CVSS v3 Score 5.3
Products affected by CVE-2026-35583
  • Nsa » Emissary » Version: 5.0.0
    cpe:2.3:a:nsa:emissary:5.0.0
  • Nsa » Emissary » Version: 5.1.0
    cpe:2.3:a:nsa:emissary:5.1.0
  • Nsa » Emissary » Version: 5.10.0
    cpe:2.3:a:nsa:emissary:5.10.0
  • Nsa » Emissary » Version: 5.11.0
    cpe:2.3:a:nsa:emissary:5.11.0
  • Nsa » Emissary » Version: 5.2.0
    cpe:2.3:a:nsa:emissary:5.2.0
  • Nsa » Emissary » Version: 5.3.0
    cpe:2.3:a:nsa:emissary:5.3.0
  • Nsa » Emissary » Version: 5.4.1
    cpe:2.3:a:nsa:emissary:5.4.1
  • Nsa » Emissary » Version: 5.5.0
    cpe:2.3:a:nsa:emissary:5.5.0
  • Nsa » Emissary » Version: 5.6.0
    cpe:2.3:a:nsa:emissary:5.6.0
  • Nsa » Emissary » Version: 5.7.0
    cpe:2.3:a:nsa:emissary:5.7.0
  • Nsa » Emissary » Version: 5.8.0
    cpe:2.3:a:nsa:emissary:5.8.0
  • Nsa » Emissary » Version: 5.9.0
    cpe:2.3:a:nsa:emissary:5.9.0
  • Nsa » Emissary » Version: 6.0.0
    cpe:2.3:a:nsa:emissary:6.0.0
  • Nsa » Emissary » Version: 6.1.0
    cpe:2.3:a:nsa:emissary:6.1.0
  • Nsa » Emissary » Version: 6.2.0
    cpe:2.3:a:nsa:emissary:6.2.0
  • Nsa » Emissary » Version: 6.3.0
    cpe:2.3:a:nsa:emissary:6.3.0
  • Nsa » Emissary » Version: 6.4.0
    cpe:2.3:a:nsa:emissary:6.4.0
  • Nsa » Emissary » Version: 6.5.0
    cpe:2.3:a:nsa:emissary:6.5.0
  • Nsa » Emissary » Version: 6.6.0
    cpe:2.3:a:nsa:emissary:6.6.0


Contact Us

Shodan ® - All rights reserved