CVE-2023-26256
HIGH EXPLOITED NUCLEISTAGIL Navigation for Jira <2.0.52 - Path Traversal
Title source: llmDescription
An unauthenticated path traversal vulnerability affects the "STAGIL Navigation for Jira - Menu & Themes" plugin before 2.0.52 for Jira. By modifying the fileName parameter to the snjFooterNavigationConfig endpoint, it is possible to traverse and read the file system.
Exploits (6)
Nuclei Templates (1)
STAGIL Navigation for Jira Menu & Themes <2.0.52 - Local File Inclusion
HIGHby pikpikcu
Shodan:
title:Jira || http.title:jira
FOFA:
title=jira
Scores
CVSS v3
7.5
EPSS
0.9177
EPSS Percentile
99.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
VulnCheck KEV
2023-07-18
CWE
CWE-22
Status
published
Products (1)
stagil/stagil_navigation
< 2.0.52
Published
Feb 28, 2023
Tracked Since
Feb 18, 2026