CVE-2025-27409
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
30/04/2025
Last modified:
16/05/2025
Description
Joplin is a free, open source note taking and to-do application, which can handle a large number of notes organised into notebooks. Prior to version 3.3.3, path traversal is possible in Joplin Server if static file path starts with `css/pluginAssets` or `js/pluginAssets`. The `findLocalFile` function in the `default route` calls `localFileFromUrl` to check for special `pluginAssets` paths. If the function returns a path, the result is returned directly, without checking for path traversal. The vulnerability allows attackers to read files outside the intended directories. This issue has been patched in version 3.3.3.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:joplin_project:joplin:*:*:*:*:*:-:*:* | 3.3.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page