REDAXO is a PHP-based content management system. Prior to version 5.20.2, authenticated users with backup permissions can read arbitrary files within the webroot via path traversal in the Backup addon's file export functionality. The Backup addon does not validate the `EXPDIR` POST parameter against the UI-generated allowlist of permitted directories. An attacker can supply relative paths containing `../` sequences (or even absolute paths inside the document root) to include any readable file in the generated `.tar.gz` archive. Version 5.20.2 fixes this issue.
History

Fri, 09 Jan 2026 12:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 08 Jan 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Redaxo
Redaxo redaxo
Vendors & Products Redaxo
Redaxo redaxo

Wed, 07 Jan 2026 22:45:00 +0000

Type Values Removed Values Added
Description REDAXO is a PHP-based content management system. Prior to version 5.20.2, authenticated users with backup permissions can read arbitrary files within the webroot via path traversal in the Backup addon's file export functionality. The Backup addon does not validate the `EXPDIR` POST parameter against the UI-generated allowlist of permitted directories. An attacker can supply relative paths containing `../` sequences (or even absolute paths inside the document root) to include any readable file in the generated `.tar.gz` archive. Version 5.20.2 fixes this issue.
Title Redaxo has Path Traversal in Backup Addon Leading to Arbitrary File Read
Weaknesses CWE-22
CWE-24
References
Metrics cvssV4_0

{'score': 8.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2026-01-07T22:32:15.859Z

Updated: 2026-01-08T18:17:35.890Z

Reserved: 2026-01-05T16:44:16.367Z

Link: CVE-2026-21857

cve-icon Vulnrichment

Updated: 2026-01-08T15:09:24.426Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-01-07T23:15:50.830

Modified: 2026-01-08T19:15:58.810

Link: CVE-2026-21857

cve-icon Redhat

No data.