- Description
- Docassemble is an expert system for guided interviews and document assembly. The vulnerability allows attackers to gain unauthorized access to information on the system through URL manipulation. It affects versions 1.4.53 to 1.4.96. The vulnerability has been patched in version 1.4.97 of the master branch.
- Source
- security-advisories@github.com
- NVD status
- Analyzed
- Products
- docassemble
CVSS 3.1
- Type
- Secondary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
- Severity
- HIGH
- security-advisories@github.com
- CWE-706
- Hype score
- Not currently trending
Cool one: Docassemble Path-Traversal + SSTI Enables RCE (CVE-2024-27292) https://t.co/HTccHyy0nh
@kmkz_security
21 Dec 2025
1481 Impressions
2 Retweets
15 Likes
8 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2024-27292 exploitation campaign detected! (thread) What is the CVE-2024-27292 vulnerability? CVE-2024-27292 is a path traversal vulnerability in Docassemble. It allows unauthenticated attackers to access arbitrary files, such as /etc/passwd via specially crafted URL htt
@Crowd_Security
1 Apr 2025
280 Impressions
3 Retweets
8 Likes
1 Bookmark
1 Reply
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jhpyle:docassemble:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9BF71B1D-D8DC-4B52-AB46-4611911CCC72",
"versionEndExcluding": "1.4.97",
"versionStartIncluding": "1.4.53",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]