Roadiz is a polymorphic content management system based on a node system that can handle many types of services. A vulnerability in roadiz/documents prior to versions 2.7.9, 2.6.28, 2.5.44, and 2.3.42 allows an authenticated attacker to read any file on the server's local file system that the web server process has access to, including highly sensitive environment variables, database credentials, and internal configuration files. Versions 2.7.9, 2.6.28, 2.5.44, and 2.3.42 contain a patch.
References
| Link | Resource |
|---|---|
| https://github.com/roadiz/core-bundle-dev-app/commit/7904f690a51b88b1c72c02149ebdf85fa81f19f2 | Patch |
| https://github.com/roadiz/core-bundle-dev-app/security/advisories/GHSA-rc55-58f4-687g | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
31 Mar 2026, 21:13
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/roadiz/core-bundle-dev-app/commit/7904f690a51b88b1c72c02149ebdf85fa81f19f2 - Patch | |
| References | () https://github.com/roadiz/core-bundle-dev-app/security/advisories/GHSA-rc55-58f4-687g - Exploit, Vendor Advisory | |
| CPE | cpe:2.3:a:roadiz:core-bundle-dev-app:*:*:*:*:*:*:*:* | |
| First Time |
Roadiz
Roadiz core-bundle-dev-app |
30 Mar 2026, 13:26
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
26 Mar 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-26 18:16
Updated : 2026-03-31 21:13
NVD link : CVE-2026-33486
Mitre link : CVE-2026-33486
CVE.ORG link : CVE-2026-33486
JSON object : View
Products Affected
roadiz
- core-bundle-dev-app
CWE
CWE-918
Server-Side Request Forgery (SSRF)
