CVE-2023-26255
HIGH EXPLOITED NUCLEISTAGIL Navigation for Jira <2.0.52 - Path Traversal
Title source: llmDescription
An unauthenticated path traversal vulnerability affects the "STAGIL Navigation for Jira - Menu & Themes" plugin before 2.0.52 for Jira. By modifying the fileName parameter to the snjCustomDesignConfig endpoint, it is possible to traverse and read the file system.
Exploits (3)
nomisec
SUSPICIOUS
by tucommenceapousser · poc
https://github.com/tucommenceapousser/CVE-2023-26255-Exp
Nuclei Templates (1)
STAGIL Navigation for Jira Menu & Themes <2.0.52 - Local File Inclusion
HIGHby DhiyaneshDK
Shodan:
title:Jira || http.title:jira
FOFA:
title=jira
Scores
CVSS v3
7.5
EPSS
0.9356
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
VulnCheck KEV
2023-07-18
CWE
CWE-22
Status
published
Products (1)
stagil/stagil_navigation
< 2.0.52
Published
Feb 28, 2023
Tracked Since
Feb 18, 2026