This vulnerability occurs when an application fails to properly handle different text representations that refer to the same file or directory on the system. Attackers can use special characters or alternative naming conventions to bypass security checks and access restricted files.
Path equivalence flaws happen because security logic often checks for only one specific name or path format. Attackers exploit this by using alternative representations—like trailing dots, extra slashes, or case variations—that the operating system treats as identical but the application's filters miss. This allows them to read sensitive files they shouldn't have access to, differing from path traversal where the attacker targets a completely different file. Detecting these subtle logic gaps manually is challenging, especially in complex codebases. While SAST tools can flag the pattern, Plexicus uses AI to analyze the specific context and generate the precise code fix needed to normalize and validate all path inputs, helping teams remediate these flaws efficiently across their entire application portfolio.
Impact: Read Files or DirectoriesModify Files or DirectoriesBypass Protection Mechanism
An attacker may be able to traverse the file system to unintended locations and read or overwrite the contents of unexpected files. If the files are used for a security mechanism than an attacker may be able to bypass the mechanism.
Strategy: Input Validation
Strategy: Output Encoding
Strategy: Input Validation