CVSS Score of 10 (low)


Published Jul 5, 2023
Updated: Jul 12, 2023


A path traversal (directory traversal) vulnerability, identified as CVE-2023-36827, affects versions of Fides, an open-source privacy engineering platform, that are lower than version 2.15.1. This vulnerability allows remote attackers to access arbitrary files on the fides webserver container's filesystem. The vulnerability has been patched in fides version 2.15.1. However, if the Fides webserver API is not directly accessible and is deployed behind a recommended reverse proxy like an AWS application load balancer, the vulnerability cannot be exploited by attackers. Additionally, secrets supplied to the container using environment variables instead of a configuration file are not affected by this vulnerability. The danger posed to organizations depends on their deployment and security practices with regards to Fides and its webserver API.

Leverage our Vulnerability Intelligence module to secure your systems now - get detailed insights on CVE-2024-37364. Book your demo today.


Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-36827 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options