CVE-2021-26601
Description
ImpressCMS before 1.4.3 allows libraries/image-editor/image-edit.php image_temp Directory Traversal.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
ImpressCMS before 1.4.3 allows directory traversal in the image editor's image_temp parameter, enabling unauthorized file operations.
Vulnerability
A directory traversal vulnerability exists in ImpressCMS versions before 1.4.3 in the file libraries/image-editor/image-edit.php. The image_temp parameter is not properly sanitized, allowing an attacker to include path traversal sequences (e.g., ..) to access files outside the intended temporary directory. The issue was addressed in pull request #915 by transforming .. sequences to underscores in the parameter value [1][2].
Exploitation
An attacker must have network access to the ImpressCMS instance and the ability to send crafted HTTP requests to the image editor endpoint. No authentication is explicitly required, but the endpoint may be accessible only to certain user roles depending on configuration. The attacker can manipulate the image_temp parameter with traversal sequences like ../../etc/passwd to read arbitrary files from the server filesystem [1][2].
Impact
Successful exploitation allows an attacker to read arbitrary files on the server, potentially disclosing sensitive information such as configuration files, database credentials, or source code. The traversal could also be used to write files if the application logic allows saving to the traversed path, though the primary impact is information disclosure [2].
Mitigation
The vulnerability is fixed in ImpressCMS version 1.4.3, released on 2022-03-28 [2][4]. Users should upgrade immediately to this or a later version. The fix transforms .. to _ in the image_temp parameter to prevent directory traversal [1]. No workarounds are documented; upgrading is the recommended mitigation. This CVE is not listed in CISA's Known Exploited Vulnerabilities catalog as of the publication date.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
impresscms/impresscmsPackagist | < 1.4.3 | 1.4.3 |
Affected products
2- ImpressCMS/ImpressCMSdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- github.com/advisories/GHSA-4q96-9f63-p7jjghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2021-26601ghsaADVISORY
- karmainsecurity.com/KIS-2022-02ghsax_refsource_MISCWEB
- packetstormsecurity.com/files/166402/ImpressCMS-1.4.2-Path-Traversal.htmlghsax_refsource_MISCWEB
- seclists.org/fulldisclosure/2022/Mar/44ghsax_refsource_MISCWEB
- github.com/ImpressCMS/impresscms/issues/914ghsaWEB
- github.com/ImpressCMS/impresscms/pull/915ghsaWEB
- github.com/ImpressCMS/impresscms/releases/tag/v1.4.3ghsaWEB
- hackerone.com/reports/1081878ghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.