| Название | rachelos WeRSS WeRSS<=1.4.8 Pathname Traversal |
|---|
| Описание | ### Summary
WeRSS(https://github.com/rachelos/we-mp-rss/)'s file download endpoint contains a path traversal vulnerability that allows authorized user to read sensitive files outside the intended application directory by crafting specially crafted HTTP requests.
## Detail
https://www.notion.so/WeRSS-Path-Traversal-Vulnerability-Leads-to-Arbitrary-File-Read-2feea92a3c41804da1f1f5ddbf86e655 |
|---|
| Источник | ⚠️ https://www.notion.so/WeRSS-Path-Traversal-Vulnerability-Leads-to-Arbitrary-File-Read-2feea92a3c41804da1f1f5ddbf86e655 |
|---|
| Пользователь | din4 (UID 50867) |
|---|
| Представление | 05.02.2026 10:12 (3 месяцы назад) |
|---|
| Модерация | 08.02.2026 09:32 (3 days later) |
|---|
| Статус | принято |
|---|
| Запись VulDB | 344933 [rachelos WeRSS we-mp-rss до 1.4.8 apis/tools.py download_export_file filename обход каталога] |
|---|
| Баллы | 16 |
|---|