| Titel | rachelos WeRSS WeRSS<=1.4.8 Pathname Traversal |
|---|
| Beschreibung | ### Summary
WeRSS(https://github.com/rachelos/we-mp-rss/)'s file download endpoint contains a path traversal vulnerability that allows authorized user to read sensitive files outside the intended application directory by crafting specially crafted HTTP requests.
## Detail
https://www.notion.so/WeRSS-Path-Traversal-Vulnerability-Leads-to-Arbitrary-File-Read-2feea92a3c41804da1f1f5ddbf86e655 |
|---|
| Quelle | ⚠️ https://www.notion.so/WeRSS-Path-Traversal-Vulnerability-Leads-to-Arbitrary-File-Read-2feea92a3c41804da1f1f5ddbf86e655 |
|---|
| Benutzer | din4 (UID 50867) |
|---|
| Einreichung | 05.02.2026 10:12 (vor 3 Monaten) |
|---|
| Moderieren | 08.02.2026 09:32 (3 days later) |
|---|
| Status | Akzeptiert |
|---|
| VulDB Eintrag | 344933 [rachelos WeRSS we-mp-rss bis 1.4.8 apis/tools.py download_export_file filename Directory Traversal] |
|---|
| Punkte | 16 |
|---|