6.5 CVE-2026-35000

Enriched by CISA
 

ChangeDetection.io versions prior to 0.54.7 contain a protection bypass vulnerability in the SafeXPath3Parser implementation that allows attackers to read arbitrary local files by using unblocked XPath 3.0/3.1 functions such as json-doc() and similar file-access primitives. Attackers can exploit the incomplete blocklist of dangerous XPath functions to access sensitive data from the local filesystem.
https://nvd.nist.gov/vuln/detail/CVE-2026-35000

Categories

CWE-184 : Incomplete List of Disallowed Inputs
The product implements a protection mechanism that relies on a list of inputs (or properties of inputs) that are not allowed by policy or otherwise require other action to neutralize before additional processing takes place, but the list is incomplete. This is used by CWE and CAPEC instead of other commonly-used terms. Its counterpart is allowlist. This is often used by security tools such as firewalls, email or web gateways, proxies, etc. This term is frequently used, but usage has been declining as organizations have started to adopt other terms. Exploitation of a vulnerability with commonly-used manipulations might fail, but minor variations might succeed. Do not rely exclusively on detecting disallowed inputs. There are too many variants to encode a character, especially when different environments are used, so there is a high likelihood of missing some variants. Only use detection of disallowed inputs as a mechanism for detecting suspicious activity. Ensure that you are using other protection mechanisms that only identify "good" input - such as lists of allowed inputs - and ensure that you are properly encoding your outputs. Chain: AI agent platform does not restrict pathnames containing internal "/./" sequences (CWE-55), leading to an incomplete denylist (CWE-184) that does not prevent OS command injection (CWE-78) Chain: API for text generation using Large Language Models (LLMs) doesnot include the "\" Windows folder separator in its denylist (CWE-184)when attempting to prevent Local File Inclusion via path traversal(CWE-22), allowing deletion of arbitrary files on Windows systems. Chain: filter only checks for some shell-injection characters (CWE-184), enabling OS command injection (CWE-78) product uses a denylist to identify potentially dangerous content, allowing attacker to bypass a warning PHP remote file inclusion in web application that filters "http" and "https" URLs, but not "ftp". Programming language does not filter certain shell metacharacters in Windows environment. XSS filter doesn't filter null characters before looking for dangerous tags, which are ignored by web browsers. MIE and validate-before-cleanse. Web-based mail product doesn't restrict dangerous extensions such as ASPX on a web server, even though others are prohibited. Resultant XSS when only <script> and <style> are checked. Privileged program does not clear sensitive environment variables that are used by bash. Overlaps multiple interpretation error. SQL injection protection scheme does not quote the "\" special character. Detection of risky filename extensions prevents users from automatically executing .EXE files, but .LNK is accepted, allowing resultant Windows symbolic link. Product uses list of protected variables, but accidentally omits one dangerous variable, allowing external modification Chain: product only removes SCRIPT tags (CWE-184), enabling XSS (CWE-79) Chain: product only checks for use of "javascript:" tag (CWE-184), allowing XSS (CWE-79) using other tags Chain: OS command injection (CWE-78) enabled by using an unexpected character that is not explicitly disallowed (CWE-184) "\" not in list of disallowed values for web server, allowing path traversal attacks when the server is run on Windows and other OSes.

References


 

AFFECTED (from MITRE)


Vendor Product Versions
dgtlmoon ChangeDetection.io
  • < 0.54.7 [affected]
  • dadc804567a51f803cd6715f7885c11a247915f6 [unaffected]
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

CPE

cpe start end


REMEDIATION




EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
No known exploits


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
120 Double Encoding
Medium
15 Command Delimiters
High
182 Flash Injection
Medium
3 Using Leading 'Ghost' Character Sequences to Bypass Input Filters
Medium
43 Exploiting Multiple Input Interpretation Layers
High
6 Argument Injection
High
71 Using Unicode Encoding to Bypass Validation Logic
High
73 User-Controlled Filename
High
85 AJAX Footprinting
Low