etherpad CVE Vulnerabilities & Metrics

Focus on etherpad vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About etherpad Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with etherpad. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total etherpad CVEs: 17
Earliest CVE date: 07 Jul 2017, 16:29 UTC
Latest CVE date: 09 Dec 2021, 23:15 UTC

Latest CVE reference: CVE-2021-43802

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical etherpad CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 5.58

Max CVSS: 9.0

Critical CVEs (≥9): 1

CVSS Range vs. Count

Range Count
0.0-3.9 0
4.0-6.9 14
7.0-8.9 2
9.0-10.0 1

CVSS Distribution Chart

Top 5 Highest CVSS etherpad CVEs

These are the five CVEs with the highest CVSS scores for etherpad, sorted by severity first and recency.

All CVEs for etherpad

CVE-2021-43802 etherpad vulnerability CVSS: 9.0 09 Dec 2021, 23:15 UTC

Etherpad is a real-time collaborative editor. In versions prior to 1.8.16, an attacker can craft an `*.etherpad` file that, when imported, might allow the attacker to gain admin privileges for the Etherpad instance. This, in turn, can be used to install a malicious Etherpad plugin that can execute arbitrary code (including system commands). To gain privileges, the attacker must be able to trigger deletion of `express-session` state or wait for old `express-session` state to be cleaned up. Core Etherpad does not delete any `express-session` state, so the only known attacks require either a plugin that can delete session state or a custom cleanup process (such as a cron job that deletes old `sessionstorage:*` records). The problem has been fixed in version 1.8.16. If users cannot upgrade to 1.8.16 or install patches manually, several workarounds are available. Users may configure their reverse proxies to reject requests to `/p/*/import`, which will block all imports, not just `*.etherpad` imports; limit all users to read-only access; and/or prevent the reuse of `express_sid` cookie values that refer to deleted express-session state. More detailed information and general mitigation strategies may be found in the GitHub Security Advisory.

CVE-2021-34816 etherpad vulnerability CVSS: 6.5 21 Jul 2021, 18:15 UTC

An Argument Injection issue in the plugin management of Etherpad 1.8.13 allows privileged users to execute arbitrary code on the server by installing plugins from an attacker-controlled source.

CVE-2021-34817 etherpad vulnerability CVSS: 4.3 19 Jul 2021, 14:15 UTC

A Cross-Site Scripting (XSS) issue in the chat component of Etherpad 1.8.13 allows remote attackers to inject arbitrary JavaScript or HTML by importing a crafted pad.

CVE-2020-22785 etherpad vulnerability CVSS: 5.0 28 Apr 2021, 21:15 UTC

Etherpad < 1.8.3 is affected by a missing lock check which could cause a denial of service. Aggressively targeting random pad import endpoints with empty data would flatten all pads due to lack of rate limiting and missing ownership check.

CVE-2020-22784 etherpad vulnerability CVSS: 5.0 28 Apr 2021, 21:15 UTC

In Etherpad UeberDB < 0.4.4, due to MySQL omitting trailing spaces on char / varchar columns during comparisons, retrieving database records using UeberDB's MySQL connector could allow bypassing access controls enforced on key names.

CVE-2020-22783 etherpad vulnerability CVSS: 4.0 28 Apr 2021, 21:15 UTC

Etherpad <1.8.3 stored passwords used by users insecurely in the database and in log files. This affects every database backend supported by Etherpad.

CVE-2020-22782 etherpad vulnerability CVSS: 5.0 28 Apr 2021, 21:15 UTC

Etherpad < 1.8.3 is affected by a denial of service in the import functionality. Upload of binary file to the import endpoint would crash the instance.

CVE-2020-22781 etherpad vulnerability CVSS: 5.0 28 Apr 2021, 21:15 UTC

In Etherpad < 1.8.3, a specially crafted URI would raise an unhandled exception in the cache mechanism and cause a denial of service (crash the instance).

CVE-2015-3309 etherpad vulnerability CVSS: 5.0 13 Feb 2020, 20:15 UTC

Directory traversal vulnerability in node/utils/Minify.js in Etherpad 1.1.2 through 1.5.4 allows remote attackers to read arbitrary files with permissions of the user running the service via a .. (dot dot) in the path parameter of HTTP API requests. NOTE: This vulnerability is due to an incomplete fix to CVE-2015-3297.

CVE-2019-18209 etherpad vulnerability CVSS: 4.3 19 Oct 2019, 01:15 UTC

templates/pad.html in Etherpad-Lite 1.7.5 has XSS when the browser does not encode the path of the URL, as demonstrated by Internet Explorer.

CVE-2018-9327 etherpad vulnerability CVSS: 6.8 07 Apr 2018, 21:29 UTC

Etherpad 1.5.x and 1.6.x before 1.6.4 allows an attacker to execute arbitrary code on the server. The instance has to be configured to use a document database (DirtyDB, CouchDB, MongoDB, or RethinkDB).

CVE-2018-9326 etherpad vulnerability CVSS: 7.5 07 Apr 2018, 21:29 UTC

Etherpad 1.6.3 before 1.6.4 allows an attacker to execute arbitrary code.

CVE-2018-9325 etherpad vulnerability CVSS: 5.0 07 Apr 2018, 21:29 UTC

Etherpad 1.5.x and 1.6.x before 1.6.4 allows an attacker to export all the existing pads of an instance without knowledge of pad names.

CVE-2018-6835 etherpad vulnerability CVSS: 7.5 08 Feb 2018, 07:29 UTC

node/hooks/express/apicalls.js in Etherpad Lite before v1.6.3 mishandles JSONP, which allows remote attackers to bypass intended access restrictions.

CVE-2015-2298 etherpad vulnerability CVSS: 5.0 12 Jan 2018, 17:29 UTC

node/utils/ExportEtherpad.js in Etherpad 1.5.x before 1.5.2 might allow remote attackers to obtain sensitive information by leveraging an improper substring check when exporting a padID.

CVE-2015-4085 etherpad vulnerability CVSS: 5.0 07 Sep 2017, 20:29 UTC

Directory traversal vulnerability in node/hooks/express/tests.js in Etherpad frontend tests before 1.6.1.

CVE-2015-3297 etherpad vulnerability CVSS: 5.0 07 Jul 2017, 16:29 UTC

Directory traversal vulnerability in node/utils/Minify.js in Etherpad 1.1.1 through 1.5.2 allows remote attackers to read arbitrary files by leveraging replacement of backslashes with slashes in the path parameter of HTTP API requests.