Description
changedetection.io is a free open source web page change detection tool. Prior to 0.54.7, the `jq:` and `jqraw:` include filter expressions allow use of the jq `env` builtin, which reads all process environment variables and stores them as the watch snapshot. An authenticated user (or unauthenticated user when no password is set, the default) can leak sensitive environment variables including `SALTED_PASS`, `PLAYWRIGHT_DRIVER_URL`, `HTTP_PROXY`, and any secrets passed as env vars to the container. Version 0.54.7 patches the issue.
Published: 2026-03-27
Score: 8.3 High
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Immediate Patch
AI Analysis

Impact

This vulnerability allows the use of the jq environment variable builtin within include filter expressions in changedetection.io. When an authenticated user (or an unauthenticated user if no password is enabled) adds a watch, the process environment variables are read and stored as part of the watch snapshot. Secrets such as SALTED_PASS, PLAYWRIGHT_DRIVER_URL, HTTP_PROXY, or any other secrets exported to the container become visible to users with access to the watch data, thereby breaching confidentiality.

Affected Systems

The flaw affects the open-source web page change detection tool provided by dgtlmoon:changedetection.io. All installations running a version earlier than 0.54.7 are vulnerable. Users who operate the application without authentication or with domain‑scope authentication can trigger the data leakage.

Risk and Exploitability

The CVSS v3.1 score of 8.3 classifies this as a High severity vulnerability. The EPSS score is below 1%, indicating a low likelihood of being exploited in the wild, and it is not listed in CISA’s KEV catalog. Based on the description, the attack vector is likely local / application, where an attacker can send a crafted request that includes a jq filter. Successful exploitation results in exposure of environment secrets to the attacker, which could lead to further compromise of the host or other systems if those secrets are used for privileged access.

Generated by OpenCVE AI on April 2, 2026 at 16:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade changedetection.io to version 0.54.7 or later.

Generated by OpenCVE AI on April 2, 2026 at 16:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-58r7-4wr5-hfx8 Changedetection.io Discloses Environment Variables via jq env Builtin in Include Filters
History

Thu, 02 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Webtechnologies
Webtechnologies changedetection
CPEs cpe:2.3:a:webtechnologies:changedetection:*:*:*:*:*:*:*:*
Vendors & Products Webtechnologies
Webtechnologies changedetection
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Mon, 30 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 30 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Dgtlmoon
Dgtlmoon changedetection.io
Vendors & Products Dgtlmoon
Dgtlmoon changedetection.io

Sat, 28 Mar 2026 03:15:00 +0000

Type Values Removed Values Added
Description changedetection.io is a free open source web page change detection tool. Prior to 0.54.7, the `jq:` and `jqraw:` include filter expressions allow use of the jq `env` builtin, which reads all process environment variables and stores them as the watch snapshot. An authenticated user (or unauthenticated user when no password is set, the default) can leak sensitive environment variables including `SALTED_PASS`, `PLAYWRIGHT_DRIVER_URL`, `HTTP_PROXY`, and any secrets passed as env vars to the container. Version 0.54.7 patches the issue.
Title Changedetection.io Discloses Environment Variables via jq env Builtin in Include Filters
Weaknesses CWE-200
References
Metrics cvssV4_0

{'score': 8.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N'}


Subscriptions

Dgtlmoon Changedetection.io
Webtechnologies Changedetection
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-30T18:36:23.805Z

Reserved: 2026-03-24T22:20:06.210Z

Link: CVE-2026-33981

cve-icon Vulnrichment

Updated: 2026-03-30T18:36:08.872Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-27T22:16:22.793

Modified: 2026-04-02T15:24:05.933

Link: CVE-2026-33981

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:22:53Z

Weaknesses