Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. changedetection.io
  4. ›
  5. CVE-2026-43891

CVE-2026-43891: changedetection.io has an Arbitrary Local File Read via a crafted backup restore

May 5, 2026

This is an arbitrary local file disclosure vulnerability reachable through malicious backup restore content.

Who is impacted:

  • Deployments where the application process has read access to sensitive local system files.
  • Docker or host-mounted environments where secrets, config files, or operational artifacts are explicitly readable by the service.

What can be exposed:

  • Arbitrary System Files: Core operating system files (e.g., /etc/passwd, /proc/self/environ), system-level configurations, and host metrics.
  • Application Data: Internal records and files residing under the /datastore directory.
  • Secrets & Artifacts: Application-local configuration files, API tokens, database credentials, and other sensitive artifacts accessible to the application process.

By accessing the backup restore functionality and importing a crafted archive, an attacker can exploit the application’s fail-open path validation. The confidentiality impact is exceptionally high because, once the payload is ingested, the application can be manipulated to disclose arbitrary local system files and highly sensitive environment variables directly through standard UI or API responses.

References

  • github.com/advisories/GHSA-8757-69j2-hx56
  • github.com/dgtlmoon/changedetection.io
  • github.com/dgtlmoon/changedetection.io/security/advisories/GHSA-8757-69j2-hx56
  • nvd.nist.gov/vuln/detail/CVE-2026-43891

Code Behaviors & Features

Detect and mitigate CVE-2026-43891 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.55.1

Fixed versions

  • 0.55.1

Solution

Upgrade to version 0.55.1 or above.

Impact 7.5 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-73: External Control of File Name or Path

Source file

pypi/changedetection.io/CVE-2026-43891.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 00:19:09 +0000.