Unrated severityNVD Advisory· Published Apr 30, 2025· Updated Apr 30, 2025
Joplin Server Vulnerable to Path Traversal
CVE-2025-27409
Description
Joplin is a free, open source note taking and to-do application, which can handle a large number of notes organised into notebooks. Prior to version 3.3.3, path traversal is possible in Joplin Server if static file path starts with css/pluginAssets or js/pluginAssets. The findLocalFile function in the default route calls localFileFromUrl to check for special pluginAssets paths. If the function returns a path, the result is returned directly, without checking for path traversal. The vulnerability allows attackers to read files outside the intended directories. This issue has been patched in version 3.3.3.
Affected products
2- laurent22/joplinv5Range: < 3.3.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/laurent22/joplin/pull/11916mitrex_refsource_MISC
- github.com/laurent22/joplin/security/advisories/GHSA-5xv6-7jm3-fmg5mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.