Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25527: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in dgtlmoon changedetection.io

0
Medium
VulnerabilityCVE-2026-25527cvecve-2026-25527cwe-22
Published: Thu Feb 19 2026 (02/19/2026, 14:18:18 UTC)
Source: CVE Database V5
Vendor/Project: dgtlmoon
Product: changedetection.io

Description

changedetection.io is a free open source web page change detection tool. In versions prior to 0.53.2, the `/static/<group>/<filename>` route accepts `group=".."`, which causes `send_from_directory("static/..", filename)` to execute. This moves the base directory up to `/app/changedetectionio`, enabling unauthenticated local file read of application source files (e.g., `flask_app.py`). Version 0.53.2 fixes the issue.

AI-Powered Analysis

AILast updated: 02/19/2026, 14:47:56 UTC

Technical Analysis

CVE-2026-25527 is a path traversal vulnerability classified under CWE-22 affecting changedetection.io, an open-source web page change detection tool. The vulnerability arises from improper validation of the 'group' parameter in the /static/<group>/<filename> route. Specifically, if 'group' is set to '..', the application calls send_from_directory with a base directory of 'static/..', effectively moving the base directory up to '/app/changedetectionio'. This allows an unauthenticated attacker to read arbitrary files within the application directory, including sensitive source code files like flask_app.py. The vulnerability does not require any privileges or user interaction, making it remotely exploitable over the network. The CVSS 3.1 score is 5.3, reflecting a medium severity impact primarily on confidentiality, with no impact on integrity or availability. The flaw was addressed in version 0.53.2 by properly restricting directory traversal in the route handler. No known exploits are reported in the wild as of the publication date. This vulnerability highlights the risks of insufficient input validation in web applications, especially in open-source projects where source code disclosure can facilitate further attacks.

Potential Impact

The primary impact of CVE-2026-25527 is unauthorized disclosure of application source code and potentially other sensitive files within the changedetection.io installation directory. Exposure of source code can reveal internal logic, credentials, API keys, or other secrets embedded in code, increasing the risk of further exploitation such as privilege escalation or remote code execution. Although the vulnerability does not allow modification or deletion of files, the confidentiality breach can undermine trust in the application and lead to targeted attacks. Organizations running vulnerable versions may face increased risk of intellectual property theft and exposure of sensitive configuration data. Since the vulnerability is remotely exploitable without authentication, any publicly accessible instance of changedetection.io is at risk. The medium CVSS score reflects a moderate but significant threat, especially in environments where changedetection.io is integrated with other critical systems or contains sensitive monitoring configurations.

Mitigation Recommendations

To mitigate this vulnerability, organizations should upgrade changedetection.io to version 0.53.2 or later, where the path traversal flaw is fixed. If immediate upgrade is not feasible, implement strict input validation or filtering on the 'group' parameter to disallow directory traversal sequences such as '..'. Restrict network access to the changedetection.io service by using firewalls or VPNs to limit exposure to trusted users only. Employ web application firewalls (WAFs) with rules to detect and block path traversal attempts targeting the /static/ route. Regularly audit and monitor application logs for suspicious access patterns involving unusual path parameters. Additionally, consider running the application with least privilege file system permissions to limit the impact of any file disclosure. Finally, educate developers on secure coding practices to prevent similar issues in future releases.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-02T19:59:47.373Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6997227c0018ac3e97d29273

Added to database: 2/19/2026, 2:47:24 PM

Last enriched: 2/19/2026, 2:47:56 PM

Last updated: 2/20/2026, 3:56:55 AM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats