Lektor is vulnerable to Path Traversal. The vulnerability is due to improper sanitization of user-supplied input, allowing an attacker to execute arbitrary shell commands via manipulated files within the templates directory.
brave.com/privacy-updates/27-localhost-permission/
cxsecurity.com/issue/WLB-2024030043
getlektor.com/docs/quickstart
github.com/advisories/GHSA-wv28-7fpw-fj49
github.com/lektor/lektor/commit/aef3c9047655e00ff65362762cfcfffd44404687
github.com/lektor/lektor/pull/1179/commits/8f38b9713d152622b69ff5e3b1e6a0d7bb7fa800
github.com/lektor/lektor/releases/tag/v3.3.11
packetstormsecurity.com/files/177708/Lektor-Static-CMS-3.3.10-Arbitrary-File-Upload-Remote-Code-Execution.html