๐Ÿ” CVE Alert

CVE-2026-22810

HIGH 8.2

Joplin: Path traversal in OneNote importer allows overwriting arbitrary files

CVSS Score
8.2
EPSS Score
0.0%
EPSS Percentile
4th

Joplin is an open source note-taking and to-do application that organises notes and lists into notebooks. Versions prior to 3.5.7 contain a path traversal vulnerability in the importer which allows overwriting arbitrary files on disk. The OneNote converter does not sanitize the names of embedded files before writing them to disk. As a result, it's possible for an attacker to create a malicious .one file that includes file names containing ../../, that are then interpreted as part of the target path when extracting attachments from the .one file. This issue has been patched in version 3.5.7.

CWE CWE-24
Vendor laurent22
Product joplin
Published May 18, 2026
Last Updated May 20, 2026
Stay Ahead of the Next One

Get instant alerts for laurent22 joplin

Be the first to know when new high vulnerabilities affecting laurent22 joplin are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

laurent22 / joplin
< 3.5.7

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/laurent22/joplin/security/advisories/GHSA-gcmj-c9gg-9vh6 github.com: https://github.com/laurent22/joplin/pull/13736 github.com: https://github.com/laurent22/joplin/commit/791668455e1aae50501ff57ea4783b3fba9d377c github.com: https://github.com/laurent22/joplin/blob/af5108d70233b1db9410346958c1587cf7c1b16d/packages/onenote-converter/renderer/src/page/embedded_file.rs#L13-L16 github.com: https://github.com/laurent22/joplin/releases/tag/v3.5.7