


Perceptive Security
SOC/SIEM Consultancy

Talishar is a fan-made Flesh and Blood project. Prior to commit 6be3871, a Path Traversal vulnerability was identified in the gameName parameter. While the appl…
Published:
5 March 2026 at 23:00:00
Alert date:
6 March 2026 at 06:03:40
Source:
nvd.nist.gov
Web Technologies
A Path Traversal vulnerability was discovered in Talishar, a fan-made Flesh and Blood project. The vulnerability exists in the gameName parameter of the ParseGamestate.php component, which can be accessed directly as a standalone script. The absence of internal sanitization allows directory traversal sequences (../) to be processed, potentially leading to unauthorized file access. While the application's primary entry points implement input validation, this component bypasses those protections when accessed directly. The issue has been patched in commit 6be3871.
Technical details
Mitigation steps:
Affected products:
Talishar
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-28429
https://github.com/Talishar/Talishar/commit/6be3871a14c192d1fb8146cdbc76f29f27c1cf48
https://github.com/Talishar/Talishar/security/advisories/GHSA-f386-xhcw-jrx8
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
