<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-22810 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-22810/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 15 May 2026 16:29:03 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-22810/feed.xml" rel="self" type="application/rss+xml"/><item><title>Joplin OneNote Importer Path Traversal Vulnerability (CVE-2026-22810)</title><link>https://feed.craftedsignal.io/briefs/2026-05-joplin-path-traversal/</link><pubDate>Fri, 15 May 2026 16:29:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-joplin-path-traversal/</guid><description>A path traversal vulnerability exists in the OneNote importer of Joplin versions 3.5.6 and earlier. By importing a crafted .one file, an attacker can overwrite arbitrary files on the disk, potentially leading to privilege escalation and remote code execution. The vulnerability stems from the lack of sanitization of embedded file names within the OneNote converter, allowing filenames containing directory traversal sequences like `../../`.</description><content:encoded><![CDATA[<p>Joplin, a popular open-source note-taking application, is vulnerable to a path traversal attack (CVE-2026-22810) within its OneNote import functionality. This flaw affects Joplin versions 3.5.6 and earlier. The vulnerability lies in the <code>@joplin/onenote-converter</code> npm package, specifically due to the insufficient sanitization of filenames extracted from OneNote&rsquo;s <code>.one</code> files. By crafting a malicious <code>.one</code> file containing embedded files with names incorporating directory traversal sequences (e.g., <code>../../</code>), an attacker can control the write path of extracted files during the import process. This can lead to overwriting arbitrary files on the system where Joplin is running. The vulnerability was introduced around Joplin 3.2.2 when the OneNote importer was first introduced, and was identified and reported in May 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious <code>.one</code> file. This file contains specially named embedded files, with the filenames including path traversal sequences like <code>../../</code>.</li>
<li>The victim imports the malicious <code>.one</code> file into Joplin (versions 3.5.6 or earlier).</li>
<li>Joplin&rsquo;s OneNote importer (<code>@joplin/onenote-converter</code>) processes the <code>.one</code> file.</li>
<li>The importer extracts embedded files without proper sanitization of the filenames.</li>
<li>The <code>embedded_file.rs</code> component of the importer constructs a file path based on the extracted filename.</li>
<li>The path traversal sequences in the filename are interpreted, allowing the write operation to escape the intended directory.</li>
<li>The extracted file is written to an arbitrary location on the file system, overwriting the existing file.</li>
<li>The attacker achieves arbitrary file overwrite, potentially leading to code execution if a critical system file is targeted (e.g., <code>.bashrc</code> or application configuration files).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this path traversal vulnerability (CVE-2026-22810) allows an attacker to overwrite arbitrary files on the victim&rsquo;s system. This can lead to a variety of consequences, including denial of service, privilege escalation, and potentially remote code execution. The provided proof-of-concept overwrites Joplin&rsquo;s <code>log.txt</code> file, but more sensitive files such as <code>.bashrc</code> on Linux systems can be targeted. All users of Joplin versions 3.5.6 and earlier who utilize the OneNote import functionality are vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Joplin to version 3.5.7 or later to incorporate the patch for CVE-2026-22810 (<a href="https://github.com/laurent22/joplin/commit/791668455e1aae50501ff57ea4783b3fba9d377c">https://github.com/laurent22/joplin/commit/791668455e1aae50501ff57ea4783b3fba9d377c</a>).</li>
<li>Deploy the following Sigma rule to detect potential exploitation attempts involving path traversal sequences in file creation events.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>file-overwrite</category><category>cve-2026-22810</category><category>joplin</category></item></channel></rss>