Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-35000: CWE-184 Incomplete List of Disallowed Inputs in dgtlmoon ChangeDetection.io

0
High
VulnerabilityCVE-2026-35000cvecve-2026-35000cwe-184
Published: Wed Apr 01 2026 (04/01/2026, 18:09:35 UTC)
Source: CVE Database V5
Vendor/Project: dgtlmoon
Product: ChangeDetection.io

Description

ChangeDetection.io versions prior to 0.54.7 contain a protection bypass vulnerability in the SafeXPath3Parser implementation that allows attackers to read arbitrary local files by using unblocked XPath 3.0/3.1 functions such as json-doc() and similar file-access primitives. Attackers can exploit the incomplete blocklist of dangerous XPath functions to access sensitive data from the local filesystem.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 18:57:14 UTC

Technical Analysis

CVE-2026-35000 is a vulnerability identified in the SafeXPath3Parser component of ChangeDetection.io, a web monitoring tool developed by dgtlmoon. The issue stems from an incomplete list of disallowed XPath 3.0/3.1 functions, specifically those that can access local files such as json-doc() and similar primitives. XPath is a language used to query XML documents, and in this context, the parser is intended to restrict dangerous functions to prevent unauthorized file access. However, the blocklist implemented in versions prior to 0.54.7 is insufficient, allowing attackers to bypass these restrictions. By crafting malicious XPath expressions that leverage unblocked functions, an attacker can read arbitrary files from the local filesystem where ChangeDetection.io is running. This can expose sensitive configuration files, credentials, or other private data. The vulnerability does not require user interaction or authentication but does require the attacker to have some level of access to submit XPath queries to the application. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, no user interaction, and high impact on confidentiality. While no exploits are currently known in the wild, the public disclosure and high severity rating highlight the urgency for remediation. The vulnerability is classified under CWE-184 (Incomplete List of Disallowed Inputs), reflecting the failure to comprehensively block dangerous input vectors.

Potential Impact

The primary impact of CVE-2026-35000 is the unauthorized disclosure of sensitive local files on systems running vulnerable versions of ChangeDetection.io. This can lead to leakage of confidential information such as credentials, internal configuration, or proprietary data, potentially enabling further attacks like privilege escalation or lateral movement. Since the vulnerability can be exploited remotely over the network without authentication or user interaction, it poses a significant risk to organizations relying on ChangeDetection.io for web monitoring. The confidentiality breach can undermine trust and compliance with data protection regulations. Although availability and integrity impacts are not directly indicated, the exposure of sensitive files can indirectly facilitate other attacks that affect system stability or data integrity. The scope of affected systems is limited to those running vulnerable versions of the product, but given the network accessibility and ease of exploitation, the threat is considerable for organizations using this software in production environments.

Mitigation Recommendations

Organizations should immediately upgrade ChangeDetection.io to version 0.54.7 or later, where the vulnerability has been addressed by properly blocking dangerous XPath functions. If upgrading is not immediately possible, administrators should implement strict input validation and sanitization on XPath queries to ensure no unapproved functions like json-doc() are allowed. Employing runtime application self-protection (RASP) or web application firewalls (WAF) with custom rules to detect and block suspicious XPath expressions can provide interim defense. Restricting access to the ChangeDetection.io interface to trusted networks and users reduces exposure. Regularly auditing logs for unusual XPath queries can help detect attempted exploitation. Additionally, applying the principle of least privilege to the ChangeDetection.io process limits the impact of any successful file access. Finally, organizations should monitor vendor advisories for patches and updates related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-03-31T20:40:15.617Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69cd661ee6bfc5ba1de9caef

Added to database: 4/1/2026, 6:38:22 PM

Last enriched: 4/1/2026, 6:57:14 PM

Last updated: 4/3/2026, 4:31:42 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses