{"id":"CVE-2023-28459","details":"pretalx 2.3.1 before 2.3.2 allows path traversal in HTML export (a non-default feature). Users were able to upload crafted HTML documents that trigger the reading of arbitrary files.","aliases":["GHSA-wh3w-jcc7-mhmf","PYSEC-2023-41"],"modified":"2026-02-18T08:32:22.813315Z","published":"2023-04-20T21:15:08.823Z","references":[{"type":"ADVISORY","url":"https://github.com/pretalx/pretalx/releases/tag/v2.3.2"},{"type":"ADVISORY","url":"https://pretalx.com/p/news/security-release-232/"},{"type":"ADVISORY","url":"https://www.sonarsource.com/blog/pretalx-vulnerabilities-how-to-get-accepted-at-every-conference/"},{"type":"FIX","url":"https://github.com/pretalx/pretalx/commit/60722c43cf975f319e94102e6bff320723776890"},{"type":"FIX","url":"https://www.sonarsource.com/blog/pretalx-vulnerabilities-how-to-get-accepted-at-every-conference/"},{"type":"EVIDENCE","url":"https://www.sonarsource.com/blog/pretalx-vulnerabilities-how-to-get-accepted-at-every-conference/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/pretalx/pretalx","events":[{"introduced":"0"},{"fixed":"44f4b4fb1531af24f9504a804028970193fa57c9"},{"introduced":"0"},{"fixed":"60722c43cf975f319e94102e6bff320723776890"}]}],"versions":["v0.1.0","v0.2.0","v0.2.1","v0.2.2","v0.3.0","v0.3.1","v0.4.0","v0.4.1","v0.5.0","v0.6.0","v0.6.1","v0.7.0","v0.7.1","v0.8.0","v0.9.0","v1.0.0","v1.1.0","v2.0.0","v2.1.0","v2.1.1","v2.2.0","v2.3.0","v2.3.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-28459.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}]}