Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-29065: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in dgtlmoon changedetection.io

0
High
VulnerabilityCVE-2026-29065cvecve-2026-29065cwe-22
Published: Fri Mar 06 2026 (03/06/2026, 06:54:27 UTC)
Source: CVE Database V5
Vendor/Project: dgtlmoon
Product: changedetection.io

Description

changedetection.io is a free open source web page change detection tool. Prior to version 0.54.4, a Zip Slip vulnerability in the backup restore functionality allows arbitrary file overwrite via path traversal in uploaded ZIP archives. This issue has been patched in version 0.54.4.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/13/2026, 19:37:32 UTC

Technical Analysis

CVE-2026-29065 is a path traversal vulnerability identified in the open-source web page change detection tool changedetection.io, specifically affecting versions prior to 0.54.4. The vulnerability stems from improper limitation of pathname during the backup restore functionality, where the application fails to adequately sanitize file paths within uploaded ZIP archives. This flaw is a classic example of a Zip Slip vulnerability, allowing an attacker to craft a malicious ZIP file containing file paths that traverse directories (e.g., using '../') to overwrite arbitrary files on the host system outside the intended extraction directory. Because the backup restore feature processes these ZIP files without sufficient validation, an attacker can remotely upload a specially crafted archive to overwrite critical system or application files, potentially leading to system compromise, data corruption, or denial of service. The vulnerability does not require any authentication or user interaction, making it highly exploitable over the network. The CVSS 4.0 base score of 8.8 reflects the high impact on confidentiality and integrity, with no privileges or user interaction needed. The vulnerability was publicly disclosed and patched in version 0.54.4, but no known exploits have been reported in the wild as of now. Organizations using changedetection.io in production environments should urgently upgrade to the patched version to eliminate this risk.

Potential Impact

The impact of CVE-2026-29065 is significant for organizations relying on changedetection.io for web page monitoring and change detection. Successful exploitation allows attackers to overwrite arbitrary files on the host system, which can lead to several severe consequences: unauthorized modification or deletion of critical system or application files, potential remote code execution if executable files or scripts are overwritten, disruption of service due to corrupted backups or application malfunction, and compromise of data integrity. Since the vulnerability requires no authentication and can be exploited remotely, it poses a high risk of automated attacks and widespread exploitation if left unpatched. Organizations with sensitive data or critical infrastructure relying on changedetection.io could face operational disruptions, data breaches, or further lateral movement within their networks. The absence of known exploits in the wild currently reduces immediate risk, but the ease of exploitation and high impact make this a critical vulnerability to address promptly.

Mitigation Recommendations

To mitigate CVE-2026-29065, organizations should immediately upgrade changedetection.io to version 0.54.4 or later, where the vulnerability has been patched. If upgrading is temporarily not possible, implement strict network controls to restrict access to the backup restore functionality, limiting it to trusted administrators and internal networks only. Employ file integrity monitoring on the host system to detect unauthorized changes to critical files that could indicate exploitation attempts. Additionally, review and harden the permissions of directories used for backup restoration to prevent unauthorized file overwrites. Consider implementing application-layer filtering or validation proxies that inspect uploaded ZIP files for suspicious path traversal patterns before processing. Regularly audit and monitor logs related to backup restore operations to detect anomalous activities. Finally, educate system administrators about the risks of processing untrusted ZIP archives and enforce strict operational procedures around backup restoration.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-03T20:51:43.482Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69aa7f36c48b3f10ff26b935

Added to database: 3/6/2026, 7:16:06 AM

Last enriched: 3/13/2026, 7:37:32 PM

Last updated: 4/20/2026, 10:36:45 AM

Views: 75

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses