Home

Description

Joplin is an open source note-taking and to-do application that organises notes and lists into notebooks. Versions prior to 3.5.7 contain a path traversal vulnerability in the importer which allows overwriting arbitrary files on disk. The OneNote converter does not sanitize the names of embedded files before writing them to disk. As a result, it's possible for an attacker to create a malicious .one file that includes file names containing ../../, that are then interpreted as part of the target path when extracting attachments from the .one file. This issue has been patched in version 3.5.7.

PUBLISHED Reserved 2026-01-09 | Published 2026-05-18 | Updated 2026-05-20 | Assigner GitHub_M




HIGH: 8.2CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

Problem types

CWE-24: Path Traversal: '../filedir'

Product status

< 3.5.7
affected

References

github.com/...joplin/security/advisories/GHSA-gcmj-c9gg-9vh6 exploit

github.com/...joplin/security/advisories/GHSA-gcmj-c9gg-9vh6

github.com/laurent22/joplin/pull/13736

github.com/...ommit/791668455e1aae50501ff57ea4783b3fba9d377c

github.com/...e-converter/renderer/src/page/embedded_file.rs

github.com/laurent22/joplin/releases/tag/v3.5.7

cve.org (CVE-2026-22810)

nvd.nist.gov (CVE-2026-22810)

Download JSON