Vulnerability Description
Roadiz is a polymorphic content management system based on a node system that can handle many types of services. A vulnerability in roadiz/documents prior to versions 2.7.9, 2.6.28, 2.5.44, and 2.3.42 allows an authenticated attacker to read any file on the server's local file system that the web server process has access to, including highly sensitive environment variables, database credentials, and internal configuration files. Versions 2.7.9, 2.6.28, 2.5.44, and 2.3.42 contain a patch.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Roadiz | Core-Bundle-Dev-App | < 2.3.42 |
Related Weaknesses (CWE)
References
- https://github.com/roadiz/core-bundle-dev-app/commit/7904f690a51b88b1c72c02149ebPatch
- https://github.com/roadiz/core-bundle-dev-app/security/advisories/GHSA-rc55-58f4ExploitVendor Advisory
FAQ
What is CVE-2026-33486?
CVE-2026-33486 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Roadiz is a polymorphic content management system based on a node system that can handle many types of services. A vulnerability in roadiz/documents prior to versions 2.7.9, 2.6.28, 2.5.44, and 2.3.42...
How severe is CVE-2026-33486?
CVE-2026-33486 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-33486?
Check the references section above for vendor advisories and patch information. Affected products include: Roadiz Core-Bundle-Dev-App.