The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2024-29180

CVE-2024-29180: Webpack-dev-middleware Path Traversal

CVE-2024-29180 is a path traversal vulnerability in webpack-dev-middleware that allows attackers to access any file on the developer's machine. This article covers technical details, affected versions, and patches.

Published: January 28, 2026

CVE-2024-29180 Overview

CVE-2024-29180 is a path traversal vulnerability in webpack-dev-middleware, the development middleware for webpack. The vulnerability exists because the middleware does not validate the supplied URL address sufficiently before returning local files. By using URL-encoded path sequences (%2e and %2f), an attacker can bypass path restrictions and access any file on the developer's machine.

The middleware can operate with either the physical filesystem or a virtualized in-memory memfs filesystem. When the writeToDisk configuration option is set to true, the physical filesystem is used, making exploitation particularly impactful. The vulnerable getFilenameFromUrl method parses URLs and builds local file paths by stripping the public path prefix and appending the unescaped path suffix to the outputPath. Since the URL is not properly unescaped and normalized before processing, path traversal attacks become possible.

Critical Impact

Attackers can access and exfiltrate any file from a developer's machine, including source code, credentials, SSH keys, and other sensitive data. If the development server listens on a public IP or allows third-party domain access, remote exploitation without victim interaction is possible.

Affected Products

  • webpack-dev-middleware versions prior to 7.1.0
  • webpack-dev-middleware versions prior to 6.1.2
  • webpack-dev-middleware versions prior to 5.3.4

Discovery Timeline

  • 2024-03-21 - CVE CVE-2024-29180 published to NVD
  • 2025-12-15 - Last updated in NVD database

Technical Details for CVE-2024-29180

Vulnerability Analysis

This path traversal vulnerability (CWE-22) allows unauthorized file access through improper URL validation. The core issue lies in the getFilenameFromUrl method which processes user-supplied URLs without proper sanitization. When a request comes in, the middleware strips the public path prefix from the URL and appends the remaining path to the output directory. However, because URL-encoded characters are not decoded before path construction, an attacker can use %2e (representing .) and %2f (representing /) sequences to construct directory traversal payloads that escape the intended directory boundaries.

The vulnerability affects developers using webpack-dev-server or webpack-dev-middleware during development. The attack surface varies based on the server's network exposure: if listening on localhost only, an attacker would need to leverage cross-site scripting or other client-side attacks; if listening on 0.0.0.0 or a public IP, direct network access enables exploitation without any user interaction.

Root Cause

The root cause is insufficient input validation in the URL processing logic. The getFilenameFromUrl method in src/utils/getFilenameFromUrl.js does not properly unescape and normalize URL paths before using them to construct file system paths. This allows encoded path traversal sequences to bypass validation checks that would otherwise prevent access to files outside the designated output directory.

Attack Vector

The attack is network-based and requires no authentication or user privileges. An attacker can craft a malicious HTTP request containing URL-encoded path traversal sequences (such as ..%2f..%2f..%2f) to navigate outside the intended web root and access arbitrary files on the system. The attack complexity is low, requiring only the ability to send HTTP requests to the development server.

When the development server is bound to a public interface or 0.0.0.0, attackers on the same network can directly exploit the vulnerability. Alternatively, if the server allows cross-origin requests, an attacker can host a malicious webpage that makes requests to the victim's local development server when visited.

The vulnerability mechanism involves URL-encoded path traversal sequences bypassing path validation. When a request URL contains sequences like %2e%2e%2f (which decodes to ../), the middleware fails to normalize these before path construction, allowing directory traversal. For detailed technical information about the vulnerable code paths, refer to the GitHub File Utility Script and the GitHub Security Advisory.

Detection Methods for CVE-2024-29180

Indicators of Compromise

  • HTTP requests to the development server containing URL-encoded path traversal sequences such as %2e%2e%2f or %2e%2e/
  • Access logs showing requests for sensitive system files like /etc/passwd, .ssh/id_rsa, or .env files
  • Unusual outbound data transfers from development environments
  • Requests targeting common sensitive files with traversal patterns in the URL path

Detection Strategies

  • Monitor development server access logs for URL patterns containing %2e, %2f, or decoded .. sequences
  • Implement network monitoring to detect connections to development server ports from unexpected sources
  • Deploy web application firewall rules to block requests containing path traversal patterns
  • Use SentinelOne's behavioral AI to detect anomalous file access patterns on developer workstations

Monitoring Recommendations

  • Enable verbose logging on webpack-dev-server to capture all incoming requests with full URL paths
  • Configure network monitoring to alert on connections to common development ports (8080, 3000, etc.) from external IPs
  • Monitor file system access on developer machines for reads of sensitive configuration files
  • Review audit logs for access to files outside the project directory during development sessions

How to Mitigate CVE-2024-29180

Immediate Actions Required

  • Update webpack-dev-middleware to version 7.1.0, 6.1.2, or 5.3.4 depending on your major version branch
  • Ensure development servers are not bound to 0.0.0.0 or public IP addresses
  • Configure firewalls to block external access to development server ports
  • Review access logs for signs of exploitation attempts before applying the patch

Patch Information

The vulnerability has been fixed in webpack-dev-middleware versions 7.1.0, 6.1.2, and 5.3.4. The fix ensures that URLs are properly unescaped and normalized before any further processing, preventing path traversal attacks. Security patches are available through the following commits:

  • GitHub Commit Fix
  • GitHub Commit Update
  • GitHub Commit Change

Fixed versions are available at:

  • GitHub Release v7.1.0
  • GitHub Release v6.1.2
  • GitHub Release v5.3.4

Workarounds

  • Bind the development server to localhost (127.0.0.1) only instead of 0.0.0.0 or public interfaces
  • Use a reverse proxy with proper path validation in front of the development server
  • Disable CORS or restrict allowed origins to prevent cross-origin exploitation
  • Implement network segmentation to isolate development environments from untrusted networks
bash
# Configuration example - Bind webpack-dev-server to localhost only
# In webpack.config.js, ensure devServer configuration restricts the host:
# devServer: {
#   host: '127.0.0.1',
#   allowedHosts: ['localhost'],
#   port: 8080
# }

# Or when starting from command line:
npx webpack serve --host 127.0.0.1 --allowed-hosts localhost

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePath Traversal

  • Vendor/TechWebpack

  • SeverityHIGH

  • CVSS Score7.5

  • EPSS Probability2.53%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-22
  • Technical References
  • GitHub Release v5.3.4

  • GitHub Release v6.1.2

  • GitHub Release v7.1.0
  • Vendor Resources
  • GitHub File Utility Script

  • GitHub File System Setup Script

  • GitHub Commit Update

  • GitHub Commit Fix

  • GitHub Commit Change

  • GitHub Security Advisory GHSA-wr3j-pwj9-hqq6
  • Related CVEs
  • CVE-2025-68458: Webpack SSRF Vulnerability

  • CVE-2025-68157: Webpack SSRF Vulnerability

  • CVE-2025-30360: Webpack-dev-server XSS Vulnerability

  • CVE-2022-37599: Webpack Loader-utils ReDoS Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English