Description
changedetection.io is a free open source web page change detection tool. In versions prior to 0.53.2, the `/static/<group>/<filename>` route accepts `group=".."`, which causes `send_from_directory("static/..", filename)` to execute. This moves the base directory up to `/app/changedetectionio`, enabling unauthenticated local file read of application source files (e.g., `flask_app.py`). Version 0.53.2 fixes the issue.
Published: 2026-02-19
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthenticated Local File Read via Path Traversal
Action: Immediate Patch
AI Analysis

Impact

The flaw lies in the /static/<group>/<filename> endpoint of the web application, which accepts a path component of ".." and passes it to a file‑system call without normalizing the path. This allows an attacker to request files outside the intended static directory, exposing the application’s source code and other sensitive files. The weakness is a classic relative path traversal issue, classified as CWE‑22. The vulnerability does not provide execution capabilities or privilege escalation; its primary impact is confidentiality breach of application files.

Affected Systems

Products affected are changedetection.io from dgtlmoon. The issue exists in all releases before version 0.53.2. The 0.53.2 release contains a fix that removes the vulnerable logic.

Risk and Exploitability

The CVSS score is 5.3, indicating a moderate severity, and the EPSS score is below 1%, suggesting a very low probability of exploitation in the wild at the time of assessment. The vulnerability is not listed in the CISA KEV catalog. Exfiltration can occur through simple unauthenticated HTTP requests to URLs such as /static/../flask_app.py, which the application will serve as plain text. While the attack surface is limited to reading files on the host, an attacker could leverage the information to identify hard‑coded secrets or design further exploitation steps. No additional authentication or race conditions are required for success, making the attack vector straightforward yet confined to the local file system of the web server.

Generated by OpenCVE AI on April 18, 2026 at 17:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade changedetection.io to version 0.53.2 or later, which removes the untrusted path extraction.
  • If an upgrade is not immediately feasible, restrict external access to the /static route using web‑server configuration (e.g., enable authentication or IP filtering).
  • Deploy a security‑on‑ion rule or file path validation middleware to block paths containing ".." before they reach the application code.

Generated by OpenCVE AI on April 18, 2026 at 17:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Feb 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Dgtlmoon
Dgtlmoon changedetection.io
Vendors & Products Dgtlmoon
Dgtlmoon changedetection.io

Thu, 19 Feb 2026 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Webtechnologies
Webtechnologies changedetection
CPEs cpe:2.3:a:webtechnologies:changedetection:*:*:*:*:*:*:*:*
Vendors & Products Webtechnologies
Webtechnologies changedetection

Thu, 19 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Feb 2026 14:45:00 +0000

Type Values Removed Values Added
Description changedetection.io is a free open source web page change detection tool. In versions prior to 0.53.2, the `/static/<group>/<filename>` route accepts `group=".."`, which causes `send_from_directory("static/..", filename)` to execute. This moves the base directory up to `/app/changedetectionio`, enabling unauthenticated local file read of application source files (e.g., `flask_app.py`). Version 0.53.2 fixes the issue.
Title changedetection.io vulnerable to unauthenticated static path traversal
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Dgtlmoon Changedetection.io
Webtechnologies Changedetection
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-19T15:35:41.155Z

Reserved: 2026-02-02T19:59:47.373Z

Link: CVE-2026-25527

cve-icon Vulnrichment

Updated: 2026-02-19T15:35:25.712Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-19T15:16:11.947

Modified: 2026-02-19T19:54:04.670

Link: CVE-2026-25527

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T18:00:06Z

Weaknesses