Description
Penpot is an open-source design tool for design and code collaboration. Prior to version 2.13.2, an authenticated user can read arbitrary files from the server by supplying a local file path (e.g. `/etc/passwd`) as a font data chunk in the `create-font-variant` RPC endpoint, resulting in the file contents being stored and retrievable as a "font" asset. This is an arbitrary file read vulnerability. Any authenticated user with team edit permissions can read arbitrary files accessible to the Penpot backend process on the host filesystem. This can lead to exposure of sensitive system files, application secrets, database credentials, and private keys, potentially enabling further compromise of the server. In containerized deployments, the blast radius may be limited to the container filesystem, but environment variables, mounted secrets, and application configuration are still at risk. Version 2.13.2 contains a patch for the issue.
Published: 2026-02-19
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary File Disclosure
Action: Patch
AI Analysis

Impact

An authenticated user with edit rights on a Penpot team can send a local file path, such as /etc/passwd, in the create‑font‑variant RPC request. The backend accepts the path without validating it, reads the file, and stores its contents as a font asset that the attacker can later download. This flaw allows the attacker to read any file accessible to the Penpot process, exposing operating system user data, application secrets, database credentials, and private keys, thereby compromising confidentiality. The weakness is a classic example of a file‑path traversal and improper input validation reflected in CWE‑22 and CWE‑73.

Affected Systems

The vulnerability affects all Penpot installations running versions earlier than 2.13.2, regardless of deployment type. In non‑containerized setups the full host filesystem is readable; in containerized deployments the attack surface is limited to the container's filesystem, yet configuration files, environment variables, and mounted secrets remain at risk.

Risk and Exploitability

The score of 7.5 on the CVSS v3.1 scale denotes a high severity, while the EPSS value of less than 1% indicates that, at the time of analysis, the probability of exploitation in the wild is low. The vulnerability is not listed in the CISA KEV catalog. Explotation requires the attacker to be authenticated to Penpot with a role that includes team edit permissions and to submit a malicious font data string. No additional privileges or vulnerability in other components are required; the attack is performed entirely through the exposed RPC endpoint.

Generated by OpenCVE AI on April 17, 2026 at 17:56 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official patch by upgrading Penpot to version 2.13.2 or later.
  • Restrict the ability to create font variants to trusted users only, removing the permission from users who do not need it for legitimate use cases.
  • Run the Penpot backend under a user with restricted file system access, ensuring it cannot read sensitive system files or environment secrets.

Generated by OpenCVE AI on April 17, 2026 at 17:56 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Feb 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Kaleidos
Kaleidos penpot
CPEs cpe:2.3:a:kaleidos:penpot:*:*:*:*:*:*:*:*
Vendors & Products Kaleidos
Kaleidos penpot

Fri, 20 Feb 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Penpot
Penpot penpot
Vendors & Products Penpot
Penpot penpot

Fri, 20 Feb 2026 01:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Feb 2026 20:00:00 +0000

Type Values Removed Values Added
Description Penpot is an open-source design tool for design and code collaboration. Prior to version 2.13.2, an authenticated user can read arbitrary files from the server by supplying a local file path (e.g. `/etc/passwd`) as a font data chunk in the `create-font-variant` RPC endpoint, resulting in the file contents being stored and retrievable as a "font" asset. This is an arbitrary file read vulnerability. Any authenticated user with team edit permissions can read arbitrary files accessible to the Penpot backend process on the host filesystem. This can lead to exposure of sensitive system files, application secrets, database credentials, and private keys, potentially enabling further compromise of the server. In containerized deployments, the blast radius may be limited to the container filesystem, but environment variables, mounted secrets, and application configuration are still at risk. Version 2.13.2 contains a patch for the issue.
Title Penpot has Arbitrary File Read via create-font-variant RPC endpoint
Weaknesses CWE-22
CWE-73
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-19T21:22:40.897Z

Reserved: 2026-02-11T19:56:24.813Z

Link: CVE-2026-26202

cve-icon Vulnrichment

Updated: 2026-02-19T21:17:40.916Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-19T20:25:42.940

Modified: 2026-02-20T19:32:49.490

Link: CVE-2026-26202

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T18:00:12Z

Weaknesses