Critical (9.9)

ApostropheCMS RCE (CVE-2026-32731) [PoC]

CVE-2026-32731

ApostropheCMS is an open-source content management framework. Prior to version 3.5.3 of `@apostrophecms/import-export`, The `extract()` function in `gzip.js` constructs file-write paths using `fs.crea...

Overview

A critical security vulnerability, identified as CVE-2026-32731, has been discovered in the @apostrophecms/import-export module for ApostropheCMS. This flaw is a classic “Zip Slip” vulnerability that could allow an authenticated attacker to write malicious files to any location accessible by the Node.js server process.

Vulnerability Details

The vulnerability exists in the extract() function within the module’s gzip.js file. When processing uploaded .tar.gz files, the code uses the path.join() method to construct the destination path for extracted files. This method does not prevent or sanitize directory traversal sequences like ../. Consequently, a malicious archive containing a file named ../../evil.js would cause the system to write that file outside the intended extraction directory, potentially to critical system locations.

Impact and Risk

The impact of this vulnerability is severe (CVSS Score: 9.9). Any CMS user with the “Global Content Modify” permission-a standard role for editors and site managers-can exploit this flaw through the normal import interface. Successful exploitation could lead to:

  • Remote Code Execution (RCE) by overwriting application files.
  • System compromise and complete server takeover.
  • Data theft or destruction by accessing sensitive files.
  • Website defacement or persistent backdoor installation.

This vulnerability underscores the risks of insufficient input validation in file operations. For context on how such flaws can lead to major incidents, you can review historical breach reports.

Remediation and Mitigation

The primary and mandatory action is to update the @apostrophecms/import-export module immediately.

Action Required:

  1. Patch: Upgrade the @apostrophecms/import-export module to version 3.5.3 or later. This version fixes the path traversal issue.
  2. Verify: Confirm that no unauthorized file changes have occurred on your server since the last known-good state.
  3. Principle of Least Privilege: Audit and minimize user accounts with the “Global Content Modify” permission. Only essential administrators should hold this role.

Temporary Mitigation (if patching is delayed):

  • Disable the import functionality or the entire @apostrophecms/import-export module if it is not in active use.
  • Closely monitor server file systems for unexpected changes.

Staying informed on such critical updates is crucial for maintaining security. For the latest on vulnerabilities and patches, follow our security news coverage. Organizations using ApostropheCMS should treat this patch as an urgent priority to prevent potential system compromise.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Am I Affected by CVE-2026-32731?

Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.

Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.

Public PoC References

Unverified third-party code

These repositories are publicly listed on GitHub and have not been audited by Yazoul Security. They may contain malware, backdoors, destructive payloads, or operational security risks (telemetry, exfiltration). Treat them as hostile binaries. Inspect source before execution. Run only in isolated, disposable lab environments (offline VM, no credentials, no production data).

Authorized use only. This information is provided for defensive research, detection engineering, and patch validation. Using exploit code against systems you do not own or do not have explicit written permission to test is illegal in most jurisdictions and violates Yazoul's terms of use.

Repository Stars
0xEr3n/CVE-2026-32731

POC for CVE-2026-32731

★ 0

Showing 1 of 1 known references. Source: nomi-sec/PoC-in-GitHub.

Related Advisories

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.