CVE-2025-27409

Joplin is a free, open source note taking and to-do application, which can handle a large number of notes organised into notebooks. Prior to version 3.3.3, path traversal is possible in Joplin Server if static file path starts with `css/pluginAssets` or `js/pluginAssets`. The `findLocalFile` function in the `default route` calls `localFileFromUrl` to check for special `pluginAssets` paths. If the function returns a path, the result is returned directly, without checking for path traversal. The vulnerability allows attackers to read files outside the intended directories. This issue has been patched in version 3.3.3.
Configurations

Configuration 1 (hide)

cpe:2.3:a:joplin_project:joplin:*:*:*:*:*:-:*:*

History

16 May 2025, 16:29

Type Values Removed Values Added
CPE cpe:2.3:a:joplin_project:joplin:*:*:*:*:*:-:*:*
First Time Joplin Project joplin
Joplin Project
References () https://github.com/laurent22/joplin/security/advisories/GHSA-5xv6-7jm3-fmg5 - () https://github.com/laurent22/joplin/security/advisories/GHSA-5xv6-7jm3-fmg5 - Exploit, Vendor Advisory
References () https://github.com/laurent22/joplin/pull/11916 - () https://github.com/laurent22/joplin/pull/11916 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5

30 Apr 2025, 16:15

Type Values Removed Values Added
CWE CWE-22

30 Apr 2025, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-30 15:16

Updated : 2025-05-16 16:29


NVD link : CVE-2025-27409

Mitre link : CVE-2025-27409


JSON object : View

Products Affected

joplin_project

  • joplin
CWE

No CWE.