<div dir="ltr"><p><strong>Severity: High</strong></p><p><strong>Website:</strong>
<span style="font-size:10pt;font-family:Arial;text-decoration-line:underline;color:rgb(17,85,204)"><a class="gmail-in-cell-link" href="https://community.kde.org" target="_blank"><span style="font-size:10pt"></span></a><a class="gmail-in-cell-link" target="_blank" href="https://community.kde.org">https://community.kde.org</a></span><br><strong>Affected POC:</strong> <a class="gmail-in-cell-link" target="_blank" href="https://community.kde.org/images/" style="font-family:Arial;font-size:10pt">https://community.kde.org/images/</a></p><p><strong>Description:</strong><br>Directory listing is enabled on your server, exposing files and folders that should remain hidden. This can leak sensitive data, scripts, or configuration files, providing attackers valuable information for further exploits.</p><p><strong>Suggested Fix:</strong><br>Disable directory listing in your web server configuration (e.g., Apache’s <code>Options -Indexes</code>). Regularly audit directories to ensure sensitive files are protected.</p><p><strong>White Hat Note:</strong><br>We share these insights to enhance your site’s security. Notify us after resolution so we can retest. We appreciate your proactive security efforts and look forward to your bounty program.</p></div>