CVE-2023-28459
Python vulnerability analysis and mitigation

Overview

CVE-2023-28459 is a path traversal vulnerability discovered in pretalx 2.3.1 and earlier versions, affecting the HTML export functionality. The vulnerability was discovered by Sonar researchers and disclosed on March 7, 2023. The issue allowed privileged users to read arbitrary files from the server's filesystem through crafted HTML documents in the non-default HTML export feature (Sonar Blog, Vendor Advisory).

Technical details

The vulnerability exists in the HTML export feature where users could upload HTML files containing malicious content. When processing URLs beginning with STATICROOT or MEDIAROOT, the application would read files directly from disk without properly validating that the final path was within these directories. Attackers could use path traversal sequences '../' or absolute paths to access arbitrary files on the system. The vulnerability was assigned a CVSS v3.1 base score of 6.5 (MEDIUM) with vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N (NVD).

Impact

The vulnerability allowed privileged users to disclose any file from the server's filesystem that was accessible by the pretalx process. This could lead to unauthorized access to sensitive information stored on the server (Sonar Blog).

Mitigation and workarounds

The vulnerability was patched in pretalx version 2.3.2. The fix includes validation of file paths to ensure they remain within the intended directories. The patch was implemented by resolving the localpath and verifying it is within either MEDIAROOT or STATIC_ROOT directories (GitHub Patch). Users are strongly recommended to upgrade to version 2.3.2 or later.

Community reactions

The vendor responded quickly to the disclosure, releasing a patch within approximately 3 hours of notification. The SaaS platform pretalx.com was immediately patched, and the vendor published a detailed security advisory explaining the vulnerability and its implications (Vendor Advisory).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-66645HIGH7.5
  • PythonPython
  • nicegui
NoYesDec 09, 2025
CVE-2025-66470MEDIUM6.1
  • PythonPython
  • nicegui
NoYesDec 09, 2025
CVE-2025-66469MEDIUM6.1
  • PythonPython
  • nicegui
NoYesDec 09, 2025
CVE-2025-67502MEDIUM5.4
  • PythonPython
  • taguette
NoYesDec 09, 2025
CVE-2025-67485MEDIUM5.3
  • PythonPython
  • mad-proxy
NoNoDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management