Path traversal in Wiki.js - CVE-2021-43800

 

Path traversal in Wiki.js - CVE-2021-43800

Published: December 4, 2021 / Updated: April 28, 2026


Vulnerability identifier: #VU128260
CSH Severity: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2021-43800
CWE-ID: CWE-22
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Wiki.js
Software vendor:
Requarks.io

Description

The vulnerability allows a remote user to disclose sensitive information.

The vulnerability exists due to path traversal in asset cache fetching with storage modules implementing local asset cache when handling a specially crafted URL on Windows. A remote user can send a specially crafted URL to disclose sensitive information.

This is only possible on Windows hosts when a storage module implementing local asset cache is enabled, such as Local File System or Git, and no web application firewall strips malicious URLs.


Remediation

Install security update from vendor's website.

External links