CVE-2026-26202

7.5 HIGH

📋 TL;DR

An authenticated user with team edit permissions in Penpot can read arbitrary files from the server filesystem by exploiting a path traversal vulnerability in the font upload functionality. This allows access to sensitive system files, configuration files, and secrets. All Penpot instances running versions before 2.13.2 are affected.

💻 Affected Systems

Products:
  • Penpot
Versions: All versions prior to 2.13.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with team edit permissions. Containerized deployments may limit filesystem access to container boundaries.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise through exposure of database credentials, private keys, and application secrets, potentially leading to data exfiltration, lateral movement, or ransomware deployment.

🟠

Likely Case

Exposure of sensitive configuration files, environment variables, and application secrets that could enable further attacks or data breaches.

🟢

If Mitigated

Limited to reading files accessible to the Penpot process within container boundaries, still exposing container secrets and configuration.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authenticated. The vulnerability is publicly documented with technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.13.2

Vendor Advisory: https://github.com/penpot/penpot/security/advisories/GHSA-xp3f-g8rq-9px2

Restart Required: Yes

Instructions:

1. Backup your Penpot instance. 2. Update to version 2.13.2 or later. 3. Restart the Penpot service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Restrict user permissions

all

Temporarily remove team edit permissions from non-essential users to limit attack surface

Network segmentation

all

Isolate Penpot instances from sensitive systems and limit network access

🧯 If You Can't Patch

  • Implement strict access controls and monitor for suspicious font upload activities
  • Deploy WAF rules to block requests containing path traversal patterns in font upload endpoints

🔍 How to Verify

Check if Vulnerable:

Check if Penpot version is below 2.13.2. Review logs for suspicious font upload requests containing file paths like /etc/passwd.

Check Version:

Check Penpot admin interface or application logs for version information

Verify Fix Applied:

Confirm version is 2.13.2 or higher. Test that font uploads with path traversal payloads are rejected.

📡 Detection & Monitoring

Log Indicators:

  • Requests to /api/rpc/create-font-variant with file paths containing ../ or absolute paths
  • Unusual font upload activities from authenticated users

Network Indicators:

  • HTTP POST requests to font upload endpoints with suspicious payloads

SIEM Query:

source="penpot-logs" AND (uri_path="/api/rpc/create-font-variant" AND (request_body LIKE "%/etc/%" OR request_body LIKE "%..%"))

🔗 References

📤 Share & Export