Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2026-21857
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Redaxo has Path Traversal in Backup Addon Leading to Arbitrary File Read
Source: NVD (National Vulnerability Database)
Vulnerability Description
REDAXO is a PHP-based content management system. Prior to version 5.20.2, authenticated users with backup permissions can read arbitrary files within the webroot via path traversal in the Backup addon's file export functionality. The Backup addon does not validate the `EXPDIR` POST parameter against the UI-generated allowlist of permitted directories. An attacker can supply relative paths containing `../` sequences (or even absolute paths inside the document root) to include any readable file in the generated `.tar.gz` archive. Version 5.20.2 fixes this issue.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
路径遍历:’../filedir’
Source: NVD (National Vulnerability Database)
Vulnerability Title
REDAXO 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
REDAXO是REDAXO开源的一个内容管理系统。 REDAXO 5.20.2之前版本存在安全漏洞,该漏洞源于Backup附加组件的文件导出功能存在路径遍历,可能导致具有备份权限的用户读取webroot内的任意文件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
redaxoredaxo < 5.20.2 -
II. Public POCs for CVE-2026-21857
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2026-21857
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2026-21857

No comments yet


Leave a comment