| Title | rachelos WeRSS WeRSS<=1.4.8 Pathname Traversal |
|---|
| Description | ### Summary
WeRSS(https://github.com/rachelos/we-mp-rss/)'s file download endpoint contains a path traversal vulnerability that allows authorized user to read sensitive files outside the intended application directory by crafting specially crafted HTTP requests.
## Detail
https://www.notion.so/WeRSS-Path-Traversal-Vulnerability-Leads-to-Arbitrary-File-Read-2feea92a3c41804da1f1f5ddbf86e655 |
|---|
| Source | ⚠️ https://www.notion.so/WeRSS-Path-Traversal-Vulnerability-Leads-to-Arbitrary-File-Read-2feea92a3c41804da1f1f5ddbf86e655 |
|---|
| User | din4 (UID 50867) |
|---|
| Submission | 02/05/2026 10:12 (3 months ago) |
|---|
| Moderation | 02/08/2026 09:32 (3 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 344933 [rachelos WeRSS we-mp-rss up to 1.4.8 apis/tools.py download_export_file filename path traversal] |
|---|
| Points | 16 |
|---|