Security for everyone

CVE-2023-26256 Scanner

Detects 'Path Traversal' vulnerability in STAGIL Navigation plugin for Jira affects v. before 2.0.52.


Short Info




Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one


Parent Category

CVE-2023-26256 Scanner Detail

The STAGIL Navigation for Jira - Menu & Themes plugin is a software add-on designed for Jira - a popular project management tool used by businesses and organizations to manage tasks, track progress, and collaborate on projects. The STAGIL Navigation plugin enhances the user experience by providing customizable navigation menus and themes. It allows users to create, organize, and display content in a user-friendly and intuitive manner.

However, a critical security vulnerability has been identified in this plugin- CVE-2023-26256. This vulnerability allows an attacker to exploit a path traversal vulnerability within the plugin by modifying the fileName parameter to the snjFooterNavigationConfig endpoint, which enables unauthorized users to read files from the file system of the affected server.

The vulnerability can lead to several critical consequences that can pose a severe threat to the confidentiality, integrity, and stability of the affected system. It can lead to unauthorized access to sensitive files on the server, enabling attackers to steal confidential data. Moreover, attackers can also modify or execute arbitrary files, leading to disruption of legitimate services, and denial of service attacks.

In conclusion,'s pro features provide an easy and efficient method to identify vulnerabilities in digital assets, including plugins such as STAGIL Navigation. Knowing and understanding the potential risks of vulnerabilities can help businesses and organizations implement effective security measures to prevent exploitation and protect their digital assets.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture