Camaleon CMS versions 2.4.5.0 through 2.9.0, prior to commit f54a77e, contain a path traversal vulnerability in the AWS S3 uploader implementation that allows authenticated users to read arbitrary files from the web server’s filesystem. The issue occurs in the download_private_file functionality when the application is configured to use the CamaleonCmsAwsUploader backend. Unlike the local uploader implementation, the AWS uploader does not validate file paths with valid_folder_path?, allowing directory traversal sequences to be supplied via the file parameter. As a result, any authenticated user, including low-privileged registered users, can access sensitive files such as /etc/passwd. This issue represents a bypass of the incomplete fix for CVE-2024-46987 and affects deployments using the AWS S3 storage backend.

Project Subscriptions

Vendors Products
Owen2345 Subscribe
Camaleon Cms Subscribe
Tuzitio Subscribe
Camaleon Cms Subscribe
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-jw5g-f64p-6x78 Camaleon CMS vulnerable to Path Traversal through AWS S3 uploader implementation
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 11 Mar 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Tuzitio
Tuzitio camaleon Cms
CPEs cpe:2.3:a:tuzitio:camaleon_cms:*:*:*:*:*:*:*:*
Vendors & Products Tuzitio
Tuzitio camaleon Cms

Tue, 10 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Owen2345
Owen2345 camaleon Cms
Vendors & Products Owen2345
Owen2345 camaleon Cms

Mon, 09 Mar 2026 21:30:00 +0000

Type Values Removed Values Added
Description Camaleon CMS versions 2.4.5.0 through 2.9.0, prior to commit f54a77e, contain a path traversal vulnerability in the AWS S3 uploader implementation that allows authenticated users to read arbitrary files from the web server’s filesystem. The issue occurs in the download_private_file functionality when the application is configured to use the CamaleonCmsAwsUploader backend. Unlike the local uploader implementation, the AWS uploader does not validate file paths with valid_folder_path?, allowing directory traversal sequences to be supplied via the file parameter. As a result, any authenticated user, including low-privileged registered users, can access sensitive files such as /etc/passwd. This issue represents a bypass of the incomplete fix for CVE-2024-46987 and affects deployments using the AWS S3 storage backend.
Title Camaleon CMS AWS Uploader Authenticated Path Traversal Arbitrary File Read
Weaknesses CWE-22
References
Metrics cvssV4_0

{'score': 6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-11T19:28:03.785Z

Reserved: 2026-02-02T18:05:13.516Z

Link: CVE-2026-1776

cve-icon Vulnrichment

Updated: 2026-03-10T14:57:13.160Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-10T07:38:01.950

Modified: 2026-03-11T13:53:47.157

Link: CVE-2026-1776

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-10T14:07:00Z

Weaknesses