Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2216: Path Traversal in rachelos WeRSS we-mp-rss

0
Medium
VulnerabilityCVE-2026-2216cvecve-2026-2216
Published: Mon Feb 09 2026 (02/09/2026, 05:02:06 UTC)
Source: CVE Database V5
Vendor/Project: rachelos
Product: WeRSS we-mp-rss

Description

CVE-2026-2216 is a medium severity path traversal vulnerability in rachelos WeRSS we-mp-rss versions up to 1. 4. 8. The flaw exists in the download_export_file function within apis/tools. py, where manipulation of the filename argument allows an attacker to access arbitrary files on the server remotely without authentication or user interaction. Although the CVSS score is 5. 3, indicating moderate risk, exploitation requires low privileges but no user interaction. No known exploits are currently observed in the wild. European organizations using affected versions of WeRSS we-mp-rss are at risk of unauthorized file disclosure, which could lead to information leakage or further compromise. Mitigation involves applying patches once available or restricting access to the vulnerable API endpoint and validating input parameters rigorously.

AI-Powered Analysis

AILast updated: 02/09/2026, 06:00:50 UTC

Technical Analysis

CVE-2026-2216 identifies a path traversal vulnerability in the rachelos WeRSS we-mp-rss software, specifically in versions 1.4.0 through 1.4.8. The vulnerability resides in the download_export_file function located in apis/tools.py, where the filename parameter is insufficiently sanitized. An attacker can remotely manipulate this parameter to traverse directories and access arbitrary files on the server filesystem. This can lead to unauthorized disclosure of sensitive information, such as configuration files, credentials, or other critical data stored on the server. The vulnerability does not require user interaction and can be exploited without authentication, although it requires low privileges (PR:L) on the system. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and low impact on confidentiality (VC:L) with no impact on integrity or availability. While no public exploits are currently reported in the wild, the existence of a published exploit increases the risk of future attacks. The vulnerability affects all versions up to 1.4.8, and no official patches have been linked yet, requiring organizations to implement interim mitigations.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to unauthorized access to sensitive files on servers running the vulnerable WeRSS we-mp-rss versions. This can result in leakage of confidential data, including internal configurations, user data, or credentials, potentially facilitating further attacks such as privilege escalation or lateral movement within networks. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, face increased compliance risks and reputational damage if exploited. The remote and unauthenticated nature of the vulnerability increases the attack surface, especially for publicly accessible services. Although the impact on integrity and availability is minimal, the confidentiality breach alone can have significant operational and legal consequences under GDPR and other European data protection laws.

Mitigation Recommendations

1. Monitor for official patches or updates from rachelos and apply them promptly once released. 2. Until patches are available, restrict network access to the download_export_file API endpoint using firewalls or network segmentation to limit exposure. 3. Implement strict input validation and sanitization on the filename parameter to prevent directory traversal sequences (e.g., ../). 4. Employ web application firewalls (WAFs) with custom rules to detect and block path traversal attempts targeting this endpoint. 5. Conduct regular audits of server file access logs to detect suspicious access patterns. 6. Limit the privileges of the application process to the minimum necessary filesystem access to reduce the impact of potential exploitation. 7. Educate development and operations teams about secure coding practices to prevent similar vulnerabilities in future releases.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-08T08:32:27.048Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698974a74b57a58fa1284a55

Added to database: 2/9/2026, 5:46:15 AM

Last enriched: 2/9/2026, 6:00:50 AM

Last updated: 2/9/2026, 7:04:49 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats