Vulnerability Description
changedetection.io is a free open source web page change detection tool. Prior to version 0.54.4, the changedetection.io application allows users to specify XPath expressions as content filters via the include_filters field. These XPath expressions are processed using the elementpath library which implements XPath 3.0/3.1 specification. XPath 3.0 includes the unparsed-text() function which can read arbitrary files from the filesystem. The application does not validate or sanitize XPath expressions to block dangerous functions, allowing an attacker to read any file accessible to the application process. This issue has been patched in version 0.54.4.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Webtechnologies | Changedetection | < 0.54.4 |
Related Weaknesses (CWE)
References
- https://github.com/dgtlmoon/changedetection.io/commit/417d57e5749441e4be9acc4010Patch
- https://github.com/dgtlmoon/changedetection.io/releases/tag/0.54.4ProductRelease Notes
- https://github.com/dgtlmoon/changedetection.io/security/advisories/GHSA-6fmw-82mExploitVendor Advisory
FAQ
What is CVE-2026-29039?
CVE-2026-29039 is a vulnerability with a CVSS score of 7.5 (HIGH). changedetection.io is a free open source web page change detection tool. Prior to version 0.54.4, the changedetection.io application allows users to specify XPath expressions as content filters via th...
How severe is CVE-2026-29039?
CVE-2026-29039 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-29039?
Check the references section above for vendor advisories and patch information. Affected products include: Webtechnologies Changedetection.