## CodeQL Security Scan Flags Path Injection Vulnerability in Juice-Shop's Profile Image Upload Route
A scheduled security scan has flagged a critical vulnerability in the popular OWASP Juice-Shop training application. The automated CodeQL analysis identified an uncontrolled data path injection flaw in the `profileImageUrlUpload.ts` route, carrying a significant CVSS score of 7.5. This finding points to a direct risk where user-provided input could be used to manipulate file system paths, a classic vector for directory traversal attacks and potential server compromise.

The specific vulnerability is located at line 31 of the `routes/profileImageUrlUpload.ts` file. The CodeQL rule `js/path-injection` triggered a warning, indicating that the application constructs a filesystem path using data that originates from an external user without proper sanitization or validation. This flaw could allow an attacker to read, write, or delete files outside the intended directory by injecting sequences like `../` into the user-controlled parameter.

While the Juice-Shop project is intentionally vulnerable for educational purposes, this automated finding underscores the persistent and real-world danger of path traversal vulnerabilities in web applications. The issue was generated by a scheduled GitHub Actions workflow, highlighting the growing reliance on continuous security scanning in modern development pipelines. For production applications, such a finding would necessitate immediate code review and remediation to prevent potential data breaches or system takeover.
---
- **Source**: GitHub Issues
- **Sector**: The Lab
- **Tags**: CodeQL, Path Injection, Security Vulnerability, GitHub Actions, OWASP
- **Credibility**: unverified
- **Published**: 2026-04-05 04:26:52
- **ID**: 50335
- **URL**: https://whisperx.ai/en/intel/50335