CVE-2025-27409

Joplin is a free, open source note taking and to-do application, which can handle a large number of notes organised into notebooks. Prior to version 3.3.3, path traversal is possible in Joplin Server if static file path starts with `css/pluginAssets` or `js/pluginAssets`. The `findLocalFile` function in the `default route` calls `localFileFromUrl` to check for special `pluginAssets` paths. If the function returns a path, the result is returned directly, without checking for path traversal. The vulnerability allows attackers to read files outside the intended directories. This issue has been patched in version 3.3.3.
Configurations

Configuration 1 (hide)

cpe:2.3:a:joplin_project:joplin:*:*:*:*:*:-:*:*

History

16 May 2025, 16:29

Type Values Removed Values Added
First Time Joplin Project
Joplin Project joplin
References () https://github.com/laurent22/joplin/pull/11916 - () https://github.com/laurent22/joplin/pull/11916 - Patch
References () https://github.com/laurent22/joplin/security/advisories/GHSA-5xv6-7jm3-fmg5 - () https://github.com/laurent22/joplin/security/advisories/GHSA-5xv6-7jm3-fmg5 - Exploit, Vendor Advisory
CPE cpe:2.3:a:joplin_project:joplin:*:*:*:*:*:-:*:*

02 May 2025, 13:53

Type Values Removed Values Added
Summary
  • (es) Joplin es una aplicación gratuita y de código abierto para tomar notas y gestionar tareas pendientes, capaz de gestionar un gran número de notas organizadas en cuadernos. Antes de la versión 3.3.3, era posible path traversal en Joplin Server si la ruta estática del archivo comenzaba por `css/pluginAssets` o `js/pluginAssets`. La función `findLocalFile` de la `ruta predeterminada` llama a `localFileFromUrl` para buscar rutas especiales de `pluginAssets`. Si la función devuelve una ruta, el resultado se devuelve directamente, sin comprobar si hay path traversal. Esta vulnerabilidad permite a los atacantes leer archivos fuera de los directorios previstos. Este problema se ha corregido en la versión 3.3.3.

30 Apr 2025, 16:15

Type Values Removed Values Added
References () https://github.com/laurent22/joplin/security/advisories/GHSA-5xv6-7jm3-fmg5 - () https://github.com/laurent22/joplin/security/advisories/GHSA-5xv6-7jm3-fmg5 -

30 Apr 2025, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-30 15:16

Updated : 2025-05-16 16:29


NVD link : CVE-2025-27409

Mitre link : CVE-2025-27409

CVE.ORG link : CVE-2025-27409


JSON object : View

Products Affected

joplin_project

  • joplin
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')