changedetection.io is a free open source web page change detection tool. Prior to version 0.54.4, the changedetection.io application allows users to specify XPath expressions as content filters via the include_filters field. These XPath expressions are processed using the elementpath library which implements XPath 3.0/3.1 specification. XPath 3.0 includes the unparsed-text() function which can read arbitrary files from the filesystem. The application does not validate or sanitize XPath expressions to block dangerous functions, allowing an attacker to read any file accessible to the application process. This issue has been patched in version 0.54.4.
References
| Link | Resource |
|---|---|
| https://github.com/dgtlmoon/changedetection.io/commit/417d57e5749441e4be9acc4010369bded805d66f | Patch |
| https://github.com/dgtlmoon/changedetection.io/releases/tag/0.54.4 | Product Release Notes |
| https://github.com/dgtlmoon/changedetection.io/security/advisories/GHSA-6fmw-82m7-jq6p | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-03-06 07:16
Updated : 2026-03-10 19:37
NVD link : CVE-2026-29039
Mitre link : CVE-2026-29039
CVE.ORG link : CVE-2026-29039
JSON object : View
Products Affected
webtechnologies
- changedetection
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
