Impact
Camaleon CMS versions 2.4.5.0 through 2.9.0 allow an authenticated attacker to read arbitrary files from the web server’s filesystem. The vulnerability resides in the AWS S3 uploader’s download_private_file method, which fails to validate file paths when the backend is set to CamaleonCmsAwsUploader. This omission lets users supply path traversal sequences that can expose sensitive files such as /etc/passwd, subverting confidentiality controls and exposing system configuration.
Affected Systems
The flaw affects deployments of Camaleon CMS from version 2.4.5.0 up to and including 2.9.0 that are configured to use the Amazon Web Services S3 storage backend. Users of earlier or later releases, or those not employing the AWS uploader, are not impacted.
Risk and Exploitability
The CVSS score of 6 indicates a medium severity, and the EPSS assessment of less than 1% suggests a low probability of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. Attackers must be authenticated, yet any low‑privileged registered user can trigger the read operation, meaning a wide range of accounts could potentially exploit the flaw within their authorized scope.
OpenCVE Enrichment
Github GHSA