CVE-2026-25116

Runtipi is a personal homeserver orchestrator. Starting in version 4.5.0 and prior to version 4.7.2, an unauthenticated Path Traversal vulnerability in the `UserConfigController` allows any remote user to overwrite the system's `docker-compose.yml` configuration file. By exploiting insecure URN parsing, an attacker can replace the primary stack configuration with a malicious one, resulting in full Remote Code Execution (RCE) and host filesystem compromise the next time the instance is restarted by the operator. Version 4.7.2 fixes the vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:runtipi:runtipi:*:*:*:*:*:*:*:*

History

26 Feb 2026, 21:36

Type Values Removed Values Added
CPE cpe:2.3:a:runtipi:runtipi:*:*:*:*:*:*:*:*
First Time Runtipi
Runtipi runtipi
References () https://github.com/runtipi/runtipi/releases/tag/v4.7.2 - () https://github.com/runtipi/runtipi/releases/tag/v4.7.2 - Product, Release Notes
References () https://github.com/runtipi/runtipi/security/advisories/GHSA-mwg8-x997-cqw6 - () https://github.com/runtipi/runtipi/security/advisories/GHSA-mwg8-x997-cqw6 - Exploit, Vendor Advisory

29 Jan 2026, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-29 22:15

Updated : 2026-02-26 21:36


NVD link : CVE-2026-25116

Mitre link : CVE-2026-25116

CVE.ORG link : CVE-2026-25116


JSON object : View

Products Affected

runtipi

  • runtipi
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-306

Missing Authentication for Critical Function