-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| changedetection.io | pip | < 0.48.05 | 0.48.05 |
The vulnerability stems from an improper regex check in the URL validation logic. The original code in processors/__init__.py used re.search(r'^file:/', ...) to detect file protocol usage, but this failed to account for variations like missing slashes or added path traversal sequences. The commit f7e9846 explicitly modified this regex pattern to r'^file:', confirming this was the vulnerable function. The function's role in processing URLs and the direct correlation to the CWE-22/200 vulnerabilities described in the advisory further support this conclusion.
KEV Misses 88% of Exploited CVEs- Get the report