๐Ÿ” CVE Alert

CVE-2026-2216

MEDIUM 4.3

rachelos WeRSS we-mp-rss tools.py download_export_file path traversal

CVSS Score
4.3
EPSS Score
0.0%
EPSS Percentile
0th

A flaw has been found in rachelos WeRSS we-mp-rss up to 1.4.8. Impacted is the function download_export_file of the file apis/tools.py. Executing a manipulation of the argument filename can lead to path traversal. The attack can be launched remotely. The exploit has been published and may be used.

CWE CWE-22
Vendor rachelos
Product werss we-mp-rss
Published Feb 9, 2026
Last Updated Feb 23, 2026
Stay Ahead of the Next One

Get instant alerts for rachelos werss we-mp-rss

Be the first to know when new medium vulnerabilities affecting rachelos werss we-mp-rss are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

rachelos / WeRSS we-mp-rss
1.4.0 1.4.1 1.4.2 1.4.3 1.4.4 1.4.5 1.4.6 1.4.7 1.4.8

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/?id.344933 vuldb.com: https://vuldb.com/?ctiid.344933 vuldb.com: https://vuldb.com/?submit.752763 notion.so: https://www.notion.so/WeRSS-Path-Traversal-Vulnerability-Leads-to-Arbitrary-File-Read-2feea92a3c41804da1f1f5ddbf86e655

Credits

๐Ÿ” din4 (VulDB User)