Vulnerability Description
Wikmd is a file based wiki that uses markdown. Prior to version 1.7.1, Wikmd is vulnerable to path traversal when accessing `/list/<path:folderpath>` and discloses lists of files located on the server including sensitive data. Version 1.7.1 fixes this issue.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wikmd Project | Wikmd | < 1.7.1 |
Related Weaknesses (CWE)
References
- https://github.com/Linbreux/wikmd/commit/8d1f94ec86b5b6c3df8ef10051facfb511a7845PatchThird Party Advisory
- https://github.com/Linbreux/wikmd/security/advisories/GHSA-w4cf-92x9-v8w2Third Party Advisory
- https://github.com/Linbreux/wikmd/commit/8d1f94ec86b5b6c3df8ef10051facfb511a7845PatchThird Party Advisory
- https://github.com/Linbreux/wikmd/security/advisories/GHSA-w4cf-92x9-v8w2Third Party Advisory
FAQ
What is CVE-2022-36081?
CVE-2022-36081 is a vulnerability with a CVSS score of 7.5 (HIGH). Wikmd is a file based wiki that uses markdown. Prior to version 1.7.1, Wikmd is vulnerable to path traversal when accessing `/list/<path:folderpath>` and discloses lists of files located on the server...
How severe is CVE-2022-36081?
CVE-2022-36081 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-36081?
Check the references section above for vendor advisories and patch information. Affected products include: Wikmd Project Wikmd.