Joplin is a free, open source note taking and to-do application, which can handle a large number of notes organised into notebooks. Prior to version 3.3.3, path traversal is possible in Joplin Server if static file path starts with `css/pluginAssets` or `js/pluginAssets`. The `findLocalFile` function in the `default route` calls `localFileFromUrl` to check for special `pluginAssets` paths. If the function returns a path, the result is returned directly, without checking for path traversal. The vulnerability allows attackers to read files outside the intended directories. This issue has been patched in version 3.3.3.
References
Link | Resource |
---|---|
https://github.com/laurent22/joplin/pull/11916 | Patch |
https://github.com/laurent22/joplin/security/advisories/GHSA-5xv6-7jm3-fmg5 | Exploit Vendor Advisory |
https://github.com/laurent22/joplin/security/advisories/GHSA-5xv6-7jm3-fmg5 | Exploit Vendor Advisory |
Configurations
History
16 May 2025, 16:29
Type | Values Removed | Values Added |
---|---|---|
First Time |
Joplin Project
Joplin Project joplin |
|
References | () https://github.com/laurent22/joplin/pull/11916 - Patch | |
References | () https://github.com/laurent22/joplin/security/advisories/GHSA-5xv6-7jm3-fmg5 - Exploit, Vendor Advisory | |
CPE | cpe:2.3:a:joplin_project:joplin:*:*:*:*:*:-:*:* |
02 May 2025, 13:53
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
30 Apr 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/laurent22/joplin/security/advisories/GHSA-5xv6-7jm3-fmg5 - |
30 Apr 2025, 15:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-30 15:16
Updated : 2025-05-16 16:29
NVD link : CVE-2025-27409
Mitre link : CVE-2025-27409
CVE.ORG link : CVE-2025-27409
JSON object : View
Products Affected
joplin_project
- joplin
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')