Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-29039: CWE-94: Improper Control of Generation of Code ('Code Injection') in dgtlmoon changedetection.io

0
High
VulnerabilityCVE-2026-29039cvecve-2026-29039cwe-94
Published: Fri Mar 06 2026 (03/06/2026, 06:54:15 UTC)
Source: CVE Database V5
Vendor/Project: dgtlmoon
Product: changedetection.io

Description

CVE-2026-29039 is a high-severity vulnerability in changedetection. io versions prior to 0. 54. 4 that allows unauthenticated remote attackers to read arbitrary files on the server. The issue arises because the application processes user-supplied XPath expressions without sanitization, enabling abuse of the unparsed-text() XPath function to access filesystem contents. This vulnerability does not require authentication or user interaction and can lead to significant confidentiality breaches. It has been patched in version 0. 54. 4. Organizations using affected versions should upgrade immediately and review any exposed sensitive data.

AI-Powered Analysis

AILast updated: 03/06/2026, 07:30:53 UTC

Technical Analysis

Changedetection.io is an open-source web page change detection tool that allows users to specify XPath expressions as content filters via the include_filters field. Prior to version 0.54.4, the application uses the elementpath library to process these XPath expressions, which supports XPath 3.0/3.1 specifications. XPath 3.0 includes the unparsed-text() function, which can read arbitrary files from the filesystem. Because changedetection.io does not validate or sanitize the XPath expressions to block dangerous functions like unparsed-text(), an attacker can craft malicious XPath expressions to read any file accessible by the application process. This constitutes a code injection vulnerability categorized under CWE-94 (Improper Control of Generation of Code). The vulnerability allows remote, unauthenticated attackers to disclose sensitive information by reading arbitrary files, potentially including configuration files, credentials, or other sensitive data. The vulnerability has been assigned CVE-2026-29039 and carries a CVSS 4.0 score of 8.8 (high severity), reflecting its ease of exploitation (no privileges or user interaction required) and significant impact on confidentiality and integrity. The issue was patched in changedetection.io version 0.54.4 by presumably restricting or sanitizing XPath expressions to prevent abuse of dangerous functions. No known exploits have been reported in the wild as of the publication date.

Potential Impact

This vulnerability can lead to severe confidentiality breaches by allowing attackers to read arbitrary files on the server running changedetection.io. Sensitive information such as application configuration files, credentials, private keys, or other protected data could be exposed. This can facilitate further attacks like privilege escalation, lateral movement, or data exfiltration. Since the vulnerability requires no authentication or user interaction, any attacker with network access to the affected service can exploit it remotely. The integrity of the system is also at risk because attackers might leverage disclosed information to manipulate or disrupt the application. Availability is less directly impacted but could be affected if attackers use the information to launch follow-up attacks. Organizations relying on changedetection.io for monitoring critical web content or internal resources may face operational risks and compliance issues if sensitive data is leaked. The vulnerability's high CVSS score underscores the critical need for timely remediation.

Mitigation Recommendations

The primary mitigation is to upgrade changedetection.io to version 0.54.4 or later, where the vulnerability has been patched. If immediate upgrade is not possible, organizations should restrict access to the changedetection.io service to trusted networks only, preventing exposure to untrusted users. Implement network-level controls such as firewalls or VPNs to limit access. Additionally, review and sanitize any user-supplied XPath expressions if custom filters are used, disallowing dangerous XPath functions like unparsed-text(). Monitoring and logging access to the application can help detect suspicious activity. Conduct a thorough audit of files accessible to the application process and rotate any credentials or secrets that might have been exposed. Finally, consider deploying application-layer firewalls or runtime application self-protection (RASP) solutions that can detect and block malicious XPath expressions or code injection attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-03T17:50:11.242Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69aa7f36c48b3f10ff26b92a

Added to database: 3/6/2026, 7:16:06 AM

Last enriched: 3/6/2026, 7:30:53 AM

Last updated: 3/6/2026, 10:10:14 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses