REDAXO is a PHP-based content management system. Prior to version 5.20.2, authenticated users with backup permissions can read arbitrary files within the webroot via path traversal in the Backup addon's file export functionality. The Backup addon does not validate the `EXPDIR` POST parameter against the UI-generated allowlist of permitted directories. An attacker can supply relative paths containing `../` sequences (or even absolute paths inside the document root) to include any readable file in the generated `.tar.gz` archive. Version 5.20.2 fixes this issue.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-824x-88xg-cwrv Redaxo has Path Traversal in Backup Addon Leading to Arbitrary File Read
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 21 Jan 2026 04:00:00 +0900

Type Values Removed Values Added
CPEs cpe:2.3:a:redaxo:redaxo:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N'}


Fri, 09 Jan 2026 21:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 08 Jan 2026 19:00:00 +0900

Type Values Removed Values Added
First Time appeared Redaxo
Redaxo redaxo
Vendors & Products Redaxo
Redaxo redaxo

Thu, 08 Jan 2026 07:45:00 +0900

Type Values Removed Values Added
Description REDAXO is a PHP-based content management system. Prior to version 5.20.2, authenticated users with backup permissions can read arbitrary files within the webroot via path traversal in the Backup addon's file export functionality. The Backup addon does not validate the `EXPDIR` POST parameter against the UI-generated allowlist of permitted directories. An attacker can supply relative paths containing `../` sequences (or even absolute paths inside the document root) to include any readable file in the generated `.tar.gz` archive. Version 5.20.2 fixes this issue.
Title Redaxo has Path Traversal in Backup Addon Leading to Arbitrary File Read
Weaknesses CWE-22
CWE-24
References
Metrics cvssV4_0

{'score': 8.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-08T18:17:35.890Z

Reserved: 2026-01-05T16:44:16.367Z

Link: CVE-2026-21857

cve-icon Vulnrichment

Updated: 2026-01-08T15:09:24.426Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-07T23:15:50.830

Modified: 2026-01-20T18:49:29.420

Link: CVE-2026-21857

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-01-08T18:48:02Z

Weaknesses