CVE-2026-42564 PUBLISHED

jotty·page: Unauthenticated Path Traversal leads to sensitive file disclosure and session-token reuse impact

Assigner: GitHub_M
Reserved: 28.04.2026 Published: 11.05.2026 Updated: 11.05.2026

jotty·page is a self-hosted app for your checklists and notes. Prior to 1.22.0, an unauthenticated path traversal vulnerability exists in /api/app-icons/[filename]. The filename route parameter is joined into a filesystem path without traversal/boundary validation, allowing file reads outside data/uploads/app-icons/. This vulnerability is fixed in 1.22.0.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
CVSS Score: 8.2

Product Status

Vendor fccview
Product jotty
Versions
  • Version < 1.22.0 is affected

References

Problem Types

  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE