๐Ÿ” CVE Alert

CVE-2026-33486

MEDIUM 6.8

Roadiz has Server-Side Request Forgery (SSRF) in roadiz/documents

CVSS Score
6.8
EPSS Score
0.0%
EPSS Percentile
0th

Roadiz is a polymorphic content management system based on a node system that can handle many types of services. A vulnerability in roadiz/documents prior to versions 2.7.9, 2.6.28, 2.5.44, and 2.3.42 allows an authenticated attacker to read any file on the server's local file system that the web server process has access to, including highly sensitive environment variables, database credentials, and internal configuration files. Versions 2.7.9, 2.6.28, 2.5.44, and 2.3.42 contain a patch.

CWE CWE-918
Vendor roadiz
Product core-bundle-dev-app
Published Mar 26, 2026
Last Updated Mar 26, 2026
Stay Ahead of the Next One

Get instant alerts for roadiz core-bundle-dev-app

Be the first to know when new medium vulnerabilities affecting roadiz core-bundle-dev-app are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
None
Availability
None

Affected Versions

roadiz / core-bundle-dev-app
>= 2.7.0, < 2.7.9 >= 2.6.0, < 2.6.28 >= 2.4.0, < 2.5.44 < 2.3.42

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/roadiz/core-bundle-dev-app/security/advisories/GHSA-rc55-58f4-687g github.com: https://github.com/roadiz/core-bundle-dev-app/commit/7904f690a51b88b1c72c02149ebdf85fa81f19f2