| عنوان | rachelos WeRSS WeRSS<=1.4.8 Pathname Traversal |
|---|
| الوصف | ### Summary
WeRSS(https://github.com/rachelos/we-mp-rss/)'s file download endpoint contains a path traversal vulnerability that allows authorized user to read sensitive files outside the intended application directory by crafting specially crafted HTTP requests.
## Detail
https://www.notion.so/WeRSS-Path-Traversal-Vulnerability-Leads-to-Arbitrary-File-Read-2feea92a3c41804da1f1f5ddbf86e655 |
|---|
| المصدر | ⚠️ https://www.notion.so/WeRSS-Path-Traversal-Vulnerability-Leads-to-Arbitrary-File-Read-2feea92a3c41804da1f1f5ddbf86e655 |
|---|
| المستخدم | din4 (UID 50867) |
|---|
| ارسال | 05/02/2026 10:12 AM (2 أشهر منذ) |
|---|
| الاعتدال | 08/02/2026 09:32 AM (3 days later) |
|---|
| الحالة | تمت الموافقة |
|---|
| إدخال VulDB | 344933 [rachelos WeRSS we-mp-rss حتى 1.4.8 apis/tools.py download_export_file filename اجتياز الدليل] |
|---|
| النقاط | 16 |
|---|