CVE-2026-2216
rachelos WeRSS we-mp-rss tools.py download_export_file path traversal
CVSS Score
4.3
EPSS Score
0.0%
EPSS Percentile
0th
A flaw has been found in rachelos WeRSS we-mp-rss up to 1.4.8. Impacted is the function download_export_file of the file apis/tools.py. Executing a manipulation of the argument filename can lead to path traversal. The attack can be launched remotely. The exploit has been published and may be used.
| CWE | CWE-22 |
| Vendor | rachelos |
| Product | werss we-mp-rss |
| Published | Feb 9, 2026 |
| Last Updated | Feb 23, 2026 |
Stay Ahead of the Next One
Get instant alerts for rachelos werss we-mp-rss
Be the first to know when new medium vulnerabilities affecting rachelos werss we-mp-rss are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
rachelos / WeRSS we-mp-rss
1.4.0 1.4.1 1.4.2 1.4.3 1.4.4 1.4.5 1.4.6 1.4.7 1.4.8
References
Credits
๐ din4 (VulDB User)