Description
ChangeDetection.io versions prior to 0.54.7 contain a protection bypass vulnerability in the SafeXPath3Parser implementation that allows attackers to read arbitrary local files by using unblocked XPath 3.0/3.1 functions such as json-doc() and similar file-access primitives. Attackers can exploit the incomplete blocklist of dangerous XPath functions to access sensitive data from the local filesystem.
Published: 2026-04-01
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary File Read
Action: Patch
AI Analysis

Impact

The vulnerability lies in the SafeXPath3Parser implementation of ChangeDetection.io, where the blocklist of dangerous XPath 3.0/3.1 functions is incomplete. Attackers can supply malicious XPath expressions that include file‑access primitives such as json-doc() to read arbitrary local files. This allows a compromise of confidentiality by exposing sensitive data that resides on the host filesystem, with a CVSS score of 7.1 indicating a high risk severity.

Affected Systems

Any deployment of ChangeDetection.io with a version earlier than 0.54.7 is affected. The product is maintained by the dgtlmoon project. No additional vendor or product names are listed, and the impacted versions are all releases preceding 0.54.7 unless otherwise patched.

Risk and Exploitability

The CVSS score of 7.1 reflects a considerable threat, though the EPSS score is not available and it is not listed in the CISA KEV catalog. The attack vector is inferred to be remote; an attacker can invoke the vulnerable parser by submitting crafted XPath expressions through the web interface or API, assuming the target system is reachable and the parser is not restricted. Because the vulnerability exploitable via an input data field, the prerequisites are minimal: network access and the ability to supply input. The exploitation can lead to read access to any local file, potentially exposing configuration files, secrets, or other sensitive data.

Generated by OpenCVE AI on April 2, 2026 at 04:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to ChangeDetection.io version 0.54.7 or later, which addresses the SafeXPath3Parser blocklist issue.

Generated by OpenCVE AI on April 2, 2026 at 04:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 21 Apr 2026 00:30:00 +0000

Type Values Removed Values Added
First Time appeared Webtechnologies
Webtechnologies changedetection
CPEs cpe:2.3:a:webtechnologies:changedetection:*:*:*:*:*:*:*:*
Vendors & Products Webtechnologies
Webtechnologies changedetection

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Dgtlmoon
Dgtlmoon changedetection.io
Vendors & Products Dgtlmoon
Dgtlmoon changedetection.io

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description ChangeDetection.io versions prior to 0.54.7 contain a protection bypass vulnerability in the SafeXPath3Parser implementation that allows attackers to read arbitrary local files by using unblocked XPath 3.0/3.1 functions such as json-doc() and similar file-access primitives. Attackers can exploit the incomplete blocklist of dangerous XPath functions to access sensitive data from the local filesystem.
Title ChangeDetection.io < 0.54.7 SafeXPath3Parser Bypass Arbitrary File Read
Weaknesses CWE-184
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Dgtlmoon Changedetection.io
Webtechnologies Changedetection
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-01T19:06:41.847Z

Reserved: 2026-03-31T20:40:15.617Z

Link: CVE-2026-35000

cve-icon Vulnrichment

Updated: 2026-04-01T19:06:37.938Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-01T19:16:33.750

Modified: 2026-04-21T00:15:47.870

Link: CVE-2026-35000

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:16:54Z

Weaknesses