{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T09:40:32.088","vulnerabilities":[{"cve":{"id":"CVE-2025-27409","sourceIdentifier":"security-advisories@github.com","published":"2025-04-30T15:16:01.067","lastModified":"2025-05-16T16:29:40.663","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Joplin is a free, open source note taking and to-do application, which can handle a large number of notes organised into notebooks. Prior to version 3.3.3, path traversal is possible in Joplin Server if static file path starts with `css/pluginAssets` or `js/pluginAssets`. The `findLocalFile` function in the `default route` calls `localFileFromUrl` to check for special `pluginAssets` paths. If the function returns a path, the result is returned directly, without checking for path traversal. The vulnerability allows attackers to read files outside the intended directories. This issue has been patched in version 3.3.3."},{"lang":"es","value":"Joplin es una aplicación gratuita y de código abierto para tomar notas y gestionar tareas pendientes, capaz de gestionar un gran número de notas organizadas en cuadernos. Antes de la versión 3.3.3, era posible path traversal en Joplin Server si la ruta estática del archivo comenzaba por `css/pluginAssets` o `js/pluginAssets`. La función `findLocalFile` de la `ruta predeterminada` llama a `localFileFromUrl` para buscar rutas especiales de `pluginAssets`. Si la función devuelve una ruta, el resultado se devuelve directamente, sin comprobar si hay path traversal. Esta vulnerabilidad permite a los atacantes leer archivos fuera de los directorios previstos. Este problema se ha corregido en la versión 3.3.3."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:joplin_project:joplin:*:*:*:*:*:-:*:*","versionEndExcluding":"3.3.3","matchCriteriaId":"DD591BFD-416F-494A-8CF5-1BE3656CCC27"}]}]}],"references":[{"url":"https://github.com/laurent22/joplin/pull/11916","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/laurent22/joplin/security/advisories/GHSA-5xv6-7jm3-fmg5","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]},{"url":"https://github.com/laurent22/joplin/security/advisories/GHSA-5xv6-7jm3-fmg5","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Vendor Advisory"]}]}}]}