CVE-2026-29065
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to overwrite files on the server by uploading a specially crafted ZIP file, which can lead to unauthorized changes or access to sensitive data. It affects versions prior to 0.54.4 of the changedetection tool, so users should upgrade to the latest version to protect against this risk.
Technical Description
changedetection.io is a free open source web page change detection tool. Prior to version 0.54.4, a Zip Slip vulnerability in the backup restore functionality allows arbitrary file overwrite via path traversal in uploaded ZIP archives. This issue has been patched in version 0.54.4.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 6, 2026
about 1 month ago
Last Modified
Mar 10, 2026
28 days ago
Vendor
webtechnologies
Product
changedetection
Related Vulnerabilities
This vulnerability allows an attacker to read any file on the server where the changedetection.io application is running by using specially crafted XPath expressions. It can be exploited by anyone who can access the application and does not require any special permissions, making it a significant risk if not updated to the latest version.
An attacker can exploit a vulnerability in changedetection.io to inject malicious JavaScript into the web page, which could then be executed in the browser of anyone visiting that page. This happens when a user accesses a specific URL with a manipulated tag identifier, allowing the attacker to run harmful scripts without needing any special access.
This vulnerability allows attackers to run harmful scripts on a user's browser by tricking them into clicking a specially crafted link when adding a new change detection watch. It requires the attacker to manipulate the URL, making it possible for them to target users of the affected software version before an update is applied.