CVE-2023-26256

HIGH EXPLOITED NUCLEI

STAGIL Navigation for Jira <2.0.52 - Path Traversal

Title source: llm

Description

An unauthenticated path traversal vulnerability affects the "STAGIL Navigation for Jira - Menu & Themes" plugin before 2.0.52 for Jira. By modifying the fileName parameter to the snjFooterNavigationConfig endpoint, it is possible to traverse and read the file system.

Exploits (6)

nomisec WORKING POC 32 stars
by 0x7eTeam · infoleak
https://github.com/0x7eTeam/CVE-2023-26256
nomisec WORKING POC 3 stars
by jcad123 · infoleak
https://github.com/jcad123/CVE-2023-26256
nomisec WORKING POC
by qs119 · infoleak
https://github.com/qs119/CVE-2023-26256
nomisec WORKING POC
by xhs-d · infoleak
https://github.com/xhs-d/CVE-2023-26256
vulncheck_xdb WRITEUP
infoleak
https://github.com/1nters3ct/CVEs
inthewild WORKING POC
poc
https://github.com/aodsec/cve-2023-26256

Nuclei Templates (1)

STAGIL Navigation for Jira Menu & Themes <2.0.52 - Local File Inclusion
HIGHby pikpikcu
Shodan: title:Jira || http.title:jira
FOFA: title=jira

Scores

CVSS v3 7.5
EPSS 0.9177
EPSS Percentile 99.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Details

VulnCheck KEV 2023-07-18
CWE
CWE-22
Status published
Products (1)
stagil/stagil_navigation < 2.0.52
Published Feb 28, 2023
Tracked Since Feb 18, 2026