Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hm5p-82g6-m3xh

Опубликовано: 30 янв. 2026
Источник: github
Github: Прошло ревью
CVSS4: 6

Описание

Umbraco.Forms has Path Traversal and File Enumeration Vulnerabilities in Linux/Mac

Impact

It's possible for an authenticated backoffice-user to enumerate and traverse paths/files on the systems filesystem and read their contents, on Mac/Linux Umbraco installations using Forms. As Umbraco Cloud runs in a Windows environment, Cloud users aren't affected.

Patches

This issue affects versions 16 and 17 of Umbraco Forms and is patched in 16.4.1 and 17.1.1

Workarounds

If upgrading is not immediately possible, users can mitigate this vulnerability by:

  • Configuring a WAF or reverse proxy to block requests containing path traversal sequences (../, ..\) in the fileName parameter of the export endpoint
  • Restricting network access to the Umbraco backoffice to trusted IP ranges
  • Blocking the /umbraco/forms/api/v1/export endpoint entirely if the export feature is not required

However, upgrading to the patched version is strongly recommended.

References

Credit to Kevin Joensen from Baldur Security for finding this vulnerability

Пакеты

Наименование

Umbraco.Forms

nuget
Затронутые версииВерсия исправления

>= 16.0.0, < 16.4.1

16.4.1

Наименование

Umbraco.Forms

nuget
Затронутые версииВерсия исправления

>= 17.0.0, < 17.1.1

17.1.1

EPSS

Процентиль: 4%
0.00019
Низкий

6 Medium

CVSS4

Дефекты

CWE-22

Связанные уязвимости

nvd
9 дней назад

Umbraco Forms is a form builder that integrates with the Umbraco content management system. It's possible for an authenticated backoffice-user to enumerate and traverse paths/files on the systems filesystem and read their contents, on Mac/Linux Umbraco installations using Forms. As Umbraco Cloud runs in a Windows environment, Cloud users aren't affected. This issue affects versions 16 and 17 of Umbraco Forms and is patched in 16.4.1 and 17.1.1. If upgrading is not immediately possible, users can mitigate this vulnerability by configuring a WAF or reverse proxy to block requests containing path traversal sequences (`../`, `..\`) in the `fileName` parameter of the export endpoint, restricting network access to the Umbraco backoffice to trusted IP ranges, and/or blocking the `/umbraco/forms/api/v1/export` endpoint entirely if the export feature is not required. However, upgrading to the patched version is strongly recommended.

EPSS

Процентиль: 4%
0.00019
Низкий

6 Medium

CVSS4

Дефекты

CWE-22