Severity:

HIGH RISK

(7.5)

XPath Function Abuse (CWE-94) in changedetection.io Content Filters

CVE-2026-29039

Published:

Status:

Analyzed

Summary

Affected Context

Exploit Preconditions

Why This Happens

Potential Impact

General Mitigation Guidance

How Teams Detect Issues Like This

Frequently Asked Questions

Source

NDV

Vulnerability Type

Vulnerability Type

Category:

Code Injection / Expression Injection

CWE:

CWE-94

Impact:

Arbitrary File Read via XPath Expression Injection

Severity:

HIGH RISK

(7.5)

CVSS Version:

3.1

Vulnerability Type

Category:

Code Injection / Expression Injection

CWE:

CWE-94

Impact:

Arbitrary File Read via XPath Expression Injection

Severity:

HIGH RISK

(7.5)

CVSS Version:

3.1

Catch This CVE While Code Is Being Written

Detect vulnerable code directly in pull requests, so CVEs are fixed before merge.