Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-rc55-58f4-687g | Roadiz has Server-Side Request Forgery (SSRF) in roadiz/documents |
Wed, 01 Apr 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:roadiz:core-bundle-dev-app:*:*:*:*:*:*:*:* |
Fri, 27 Mar 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Roadiz
Roadiz core-bundle-dev-app |
|
| Vendors & Products |
Roadiz
Roadiz core-bundle-dev-app |
Thu, 26 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 26 Mar 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Roadiz is a polymorphic content management system based on a node system that can handle many types of services. A vulnerability in roadiz/documents prior to versions 2.7.9, 2.6.28, 2.5.44, and 2.3.42 allows an authenticated attacker to read any file on the server's local file system that the web server process has access to, including highly sensitive environment variables, database credentials, and internal configuration files. Versions 2.7.9, 2.6.28, 2.5.44, and 2.3.42 contain a patch. | |
| Title | Roadiz has Server-Side Request Forgery (SSRF) in roadiz/documents | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-26T18:47:26.997Z
Reserved: 2026-03-20T16:16:48.971Z
Link: CVE-2026-33486
Updated: 2026-03-26T18:47:24.111Z
Status : Analyzed
Published: 2026-03-26T18:16:29.903
Modified: 2026-03-31T21:13:52.977
Link: CVE-2026-33486
No data.
OpenCVE Enrichment
Updated: 2026-04-02T07:56:36Z
Github GHSA