CVE-2026-22810
Joplin: Path traversal in OneNote importer allows overwriting arbitrary files
CVSS Score
8.2
EPSS Score
0.0%
EPSS Percentile
4th
Joplin is an open source note-taking and to-do application that organises notes and lists into notebooks. Versions prior to 3.5.7 contain a path traversal vulnerability in the importer which allows overwriting arbitrary files on disk. The OneNote converter does not sanitize the names of embedded files before writing them to disk. As a result, it's possible for an attacker to create a malicious .one file that includes file names containing ../../, that are then interpreted as part of the target path when extracting attachments from the .one file. This issue has been patched in version 3.5.7.
| CWE | CWE-24 |
| Vendor | laurent22 |
| Product | joplin |
| Published | May 18, 2026 |
| Last Updated | May 20, 2026 |
Stay Ahead of the Next One
Get instant alerts for laurent22 joplin
Be the first to know when new high vulnerabilities affecting laurent22 joplin are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Affected Versions
laurent22 / joplin
< 3.5.7
References
github.com: https://github.com/laurent22/joplin/security/advisories/GHSA-gcmj-c9gg-9vh6 github.com: https://github.com/laurent22/joplin/pull/13736 github.com: https://github.com/laurent22/joplin/commit/791668455e1aae50501ff57ea4783b3fba9d377c github.com: https://github.com/laurent22/joplin/blob/af5108d70233b1db9410346958c1587cf7c1b16d/packages/onenote-converter/renderer/src/page/embedded_file.rs#L13-L16 github.com: https://github.com/laurent22/joplin/releases/tag/v3.5.7