πŸ” CVE Alert

CVE-2026-1776

UNKNOWN 0.0

Camaleon CMS AWS Uploader Authenticated Path Traversal Arbitrary File Read

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Camaleon CMS versions 2.4.5.0 through 2.9.0, prior to commit f54a77e, contain a path traversal vulnerability in the AWS S3 uploader implementation that allows authenticated users to read arbitrary files from the web server’s filesystem. The issue occurs in the download_private_file functionality when the application is configured to use the CamaleonCmsAwsUploader backend. Unlike the local uploader implementation, the AWS uploader does not validate file paths with valid_folder_path?, allowing directory traversal sequences to be supplied via the file parameter. As a result, any authenticated user, including low-privileged registered users, can access sensitive files such as /etc/passwd. This issue represents a bypass of the incomplete fix for CVE-2024-46987 and affects deployments using the AWS S3 storage backend.

CWE CWE-22
Vendor owen2345
Product camaleon cms
Published Mar 9, 2026
Last Updated Mar 23, 2026
Stay Ahead of the Next One

Get instant alerts for owen2345 camaleon cms

Be the first to know when new unknown vulnerabilities affecting owen2345 camaleon cms are published β€” delivered to Slack, Telegram or Discord.

Get Free Alerts β†’ Free Β· No credit card Β· 60 sec setup

Affected Versions

owen2345 / Camaleon CMS
2.4.5.0 ≀ 2.9.0

References

NVD β†— CVE.org β†— EPSS Data β†—
github.com: https://github.com/owen2345/camaleon-cms/pull/1127 github.com: https://github.com/owen2345/camaleon-cms/commit/f54a77e2a7be601215ea1b396038c589a0cab9af camaleon.website: https://camaleon.website/ vulncheck.com: https://www.vulncheck.com/advisories/camaleon-cms-aws-uploader-authenticated-path-traversal-arbitrary-file-read

Credits

Michael Loomis (investigato) VulnCheck