Impact
The vulnerability is in Pagure’s reStructuredText (RST) rendering engine. An authenticated user can use an unrestricted ‘.. include::’ directive to read any internal file on the server hosting Pagure, leading to disclosure of sensitive data. The weakness corresponds to a path traversal condition (CWE‑22). This allows an attacker with edit rights to access files that should remain confidential, potentially exposing configuration, credentials, or other private information.
Affected Systems
Any Pagure installation that uses the default RST rendering engine without restrictions on the include directive is potentially affected. No specific version numbers are provided, so all instances that permit authenticated users to create or edit RST files could be vulnerable.
Risk and Exploitability
The CVSS score is 7.7, indicating high severity for confidentiality. Existence of an EPSS score is not reported and the vulnerability is not listed in the KEV catalog. Exploitation requires an authenticated attacker, typically someone with permission to add or modify RST content. The attack vector is therefore an authenticated internal user or a compromised account. Once exploited, the attacker can read arbitrary files, compromising confidentiality of the system.
OpenCVE Enrichment