CWE WEAKNESSES / CWE-44
CWE-44
Path Equivalence: 'file.name' (Internal Dot)
Variant
What it is
The product accepts path input in the form of internal dot ('file.ordir') without appropriate validation, which can lead to ambiguous path resolution and allow an attacker to traverse the file system to unintended locations or access arbitrary files.
Impact
| Confidentiality, Integrity | Read Files or Directories, Modify Files or Directories |
Real-world CVE examples
- CVE-2025-24813 — servlet in Java-based product allows code execution via a "file.Name" internal dot
Related weaknesses
Test & detect
Browse all common weaknesses, check related exploited CVEs, or map to ATT&CK techniques.
Source: MITRE CWE. View on cwe.mitre.org →