CVE-2022-36081: CWE-23: Relative Path Traversal in Linbreux wikmd
Wikmd is a file based wiki that uses markdown. Prior to version 1.7.1, Wikmd is vulnerable to path traversal when accessing `/list/<path:folderpath>` and discloses lists of files located on the server including sensitive data. Version 1.7.1 fixes this issue.
AI Analysis
Technical Summary
CVE-2022-36081 is a path traversal vulnerability identified in the Linbreux wikmd product, a file-based wiki system that uses markdown files for content management. The vulnerability affects versions prior to 1.7.1 and arises from improper validation of user-supplied input in the `/list/<path:folderpath>` endpoint. Specifically, the application fails to properly restrict pathname inputs, allowing an attacker to manipulate the folder path parameter to traverse directories outside the intended scope. This can lead to unauthorized disclosure of file lists on the server, potentially exposing sensitive data stored within the filesystem. The underlying weakness is categorized under CWE-23 (Relative Path Traversal) and CWE-22 (Improper Limitation of a Pathname to a Restricted Directory). Although no known exploits have been reported in the wild, the vulnerability poses a risk of information leakage that could facilitate further attacks. The issue was addressed in version 1.7.1 of wikmd by implementing proper input validation and path restriction mechanisms to prevent directory traversal. Since wikmd is a file-based wiki, the exposure of directory contents could reveal configuration files, user data, or other sensitive documents depending on the deployment context. The vulnerability does not require authentication or user interaction beyond sending crafted requests to the vulnerable endpoint, making it relatively easy to exploit if the service is publicly accessible.
Potential Impact
For European organizations using wikmd versions prior to 1.7.1, this vulnerability could lead to unauthorized disclosure of sensitive internal files and directory structures. This information leakage can compromise confidentiality by revealing configuration files, credentials, or proprietary documentation stored on the server. Such exposure may facilitate subsequent targeted attacks, including privilege escalation or lateral movement within the network. The integrity of data is not directly impacted by this vulnerability, as it primarily allows read-only access to file listings rather than modification. Availability is also not directly affected. However, the breach of confidentiality can have significant reputational and compliance consequences, especially under the GDPR framework, which mandates protection of personal and sensitive data. Organizations in sectors such as government, finance, healthcare, and critical infrastructure that rely on wikmd for documentation or knowledge management may be particularly at risk. The ease of exploitation without authentication increases the threat level if the vulnerable service is accessible from the internet or untrusted networks.
Mitigation Recommendations
Upgrade all instances of wikmd to version 1.7.1 or later, where the vulnerability has been fixed with proper input validation and path restriction. If immediate upgrade is not feasible, implement network-level access controls such as firewall rules or VPN requirements to restrict access to the wikmd service to trusted internal users only. Deploy web application firewalls (WAFs) with custom rules to detect and block path traversal attempts targeting the `/list/` endpoint by filtering suspicious path characters like '../'. Conduct an audit of all wikmd deployments within the organization to identify and remediate vulnerable versions. Review and minimize the sensitive data stored in directories accessible by wikmd to reduce potential exposure. Implement logging and monitoring of access to the `/list/` endpoint to detect abnormal or unauthorized access patterns indicative of exploitation attempts. Educate development and operations teams on secure coding practices related to input validation and directory traversal prevention for future deployments.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy
CVE-2022-36081: CWE-23: Relative Path Traversal in Linbreux wikmd
Description
Wikmd is a file based wiki that uses markdown. Prior to version 1.7.1, Wikmd is vulnerable to path traversal when accessing `/list/<path:folderpath>` and discloses lists of files located on the server including sensitive data. Version 1.7.1 fixes this issue.
AI-Powered Analysis
Technical Analysis
CVE-2022-36081 is a path traversal vulnerability identified in the Linbreux wikmd product, a file-based wiki system that uses markdown files for content management. The vulnerability affects versions prior to 1.7.1 and arises from improper validation of user-supplied input in the `/list/<path:folderpath>` endpoint. Specifically, the application fails to properly restrict pathname inputs, allowing an attacker to manipulate the folder path parameter to traverse directories outside the intended scope. This can lead to unauthorized disclosure of file lists on the server, potentially exposing sensitive data stored within the filesystem. The underlying weakness is categorized under CWE-23 (Relative Path Traversal) and CWE-22 (Improper Limitation of a Pathname to a Restricted Directory). Although no known exploits have been reported in the wild, the vulnerability poses a risk of information leakage that could facilitate further attacks. The issue was addressed in version 1.7.1 of wikmd by implementing proper input validation and path restriction mechanisms to prevent directory traversal. Since wikmd is a file-based wiki, the exposure of directory contents could reveal configuration files, user data, or other sensitive documents depending on the deployment context. The vulnerability does not require authentication or user interaction beyond sending crafted requests to the vulnerable endpoint, making it relatively easy to exploit if the service is publicly accessible.
Potential Impact
For European organizations using wikmd versions prior to 1.7.1, this vulnerability could lead to unauthorized disclosure of sensitive internal files and directory structures. This information leakage can compromise confidentiality by revealing configuration files, credentials, or proprietary documentation stored on the server. Such exposure may facilitate subsequent targeted attacks, including privilege escalation or lateral movement within the network. The integrity of data is not directly impacted by this vulnerability, as it primarily allows read-only access to file listings rather than modification. Availability is also not directly affected. However, the breach of confidentiality can have significant reputational and compliance consequences, especially under the GDPR framework, which mandates protection of personal and sensitive data. Organizations in sectors such as government, finance, healthcare, and critical infrastructure that rely on wikmd for documentation or knowledge management may be particularly at risk. The ease of exploitation without authentication increases the threat level if the vulnerable service is accessible from the internet or untrusted networks.
Mitigation Recommendations
Upgrade all instances of wikmd to version 1.7.1 or later, where the vulnerability has been fixed with proper input validation and path restriction. If immediate upgrade is not feasible, implement network-level access controls such as firewall rules or VPN requirements to restrict access to the wikmd service to trusted internal users only. Deploy web application firewalls (WAFs) with custom rules to detect and block path traversal attempts targeting the `/list/` endpoint by filtering suspicious path characters like '../'. Conduct an audit of all wikmd deployments within the organization to identify and remediate vulnerable versions. Review and minimize the sensitive data stored in directories accessible by wikmd to reduce potential exposure. Implement logging and monitoring of access to the `/list/` endpoint to detect abnormal or unauthorized access patterns indicative of exploitation attempts. Educate development and operations teams on secure coding practices related to input validation and directory traversal prevention for future deployments.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-07-15T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9844c4522896dcbf3d9e
Added to database: 5/21/2025, 9:09:24 AM
Last enriched: 6/22/2025, 10:20:32 PM
Last updated: 8/4/2025, 7:07:56 AM
Views: 13
Related Threats
CVE-2025-9016: Uncontrolled Search Path in Mechrevo Control Center GX V2
HighCVE-2025-8451: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdevteam Essential Addons for Elementor – Popular Elementor Templates & Widgets
MediumCVE-2025-8013: CWE-918 Server-Side Request Forgery (SSRF) in quttera Quttera Web Malware Scanner
LowCVE-2025-6679: CWE-434 Unrestricted Upload of File with Dangerous Type in bitpressadmin Bit Form – Custom Contact Form, Multi Step, Conversational, Payment & Quiz Form builder
CriticalCVE-2025-9013: SQL Injection in PHPGurukul Online Shopping Portal Project
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.