Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-jw5g-f64p-6x78 | Camaleon CMS vulnerable to Path Traversal through AWS S3 uploader implementation |
Fri, 17 Apr 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Wed, 11 Mar 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tuzitio
Tuzitio camaleon Cms |
|
| CPEs | cpe:2.3:a:tuzitio:camaleon_cms:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Tuzitio
Tuzitio camaleon Cms |
Tue, 10 Mar 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 10 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Owen2345
Owen2345 camaleon Cms |
|
| Vendors & Products |
Owen2345
Owen2345 camaleon Cms |
Mon, 09 Mar 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Camaleon CMS versions 2.4.5.0 through 2.9.0, prior to commit f54a77e, contain a path traversal vulnerability in the AWS S3 uploader implementation that allows authenticated users to read arbitrary files from the web server’s filesystem. The issue occurs in the download_private_file functionality when the application is configured to use the CamaleonCmsAwsUploader backend. Unlike the local uploader implementation, the AWS uploader does not validate file paths with valid_folder_path?, allowing directory traversal sequences to be supplied via the file parameter. As a result, any authenticated user, including low-privileged registered users, can access sensitive files such as /etc/passwd. This issue represents a bypass of the incomplete fix for CVE-2024-46987 and affects deployments using the AWS S3 storage backend. | |
| Title | Camaleon CMS AWS Uploader Authenticated Path Traversal Arbitrary File Read | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-14T02:09:04.462Z
Reserved: 2026-02-02T18:05:13.516Z
Link: CVE-2026-1776
Updated: 2026-03-10T14:57:13.160Z
Status : Analyzed
Published: 2026-03-10T07:38:01.950
Modified: 2026-04-17T20:59:47.330
Link: CVE-2026-1776
No data.
OpenCVE Enrichment
Updated: 2026-04-16T10:15:26Z
Github GHSA