Runtipi is a personal homeserver orchestrator. Starting in version 4.5.0 and prior to version 4.7.2, an unauthenticated Path Traversal vulnerability in the `UserConfigController` allows any remote user to overwrite the system's `docker-compose.yml` configuration file. By exploiting insecure URN parsing, an attacker can replace the primary stack configuration with a malicious one, resulting in full Remote Code Execution (RCE) and host filesystem compromise the next time the instance is restarted by the operator. Version 4.7.2 fixes the vulnerability.
References
| Link | Resource |
|---|---|
| https://github.com/runtipi/runtipi/releases/tag/v4.7.2 | Product Release Notes |
| https://github.com/runtipi/runtipi/security/advisories/GHSA-mwg8-x997-cqw6 | Exploit Vendor Advisory |
Configurations
History
26 Feb 2026, 21:36
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:runtipi:runtipi:*:*:*:*:*:*:*:* | |
| First Time |
Runtipi
Runtipi runtipi |
|
| References | () https://github.com/runtipi/runtipi/releases/tag/v4.7.2 - Product, Release Notes | |
| References | () https://github.com/runtipi/runtipi/security/advisories/GHSA-mwg8-x997-cqw6 - Exploit, Vendor Advisory |
29 Jan 2026, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-29 22:15
Updated : 2026-02-26 21:36
NVD link : CVE-2026-25116
Mitre link : CVE-2026-25116
CVE.ORG link : CVE-2026-25116
JSON object : View
Products Affected
runtipi
- runtipi
