Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 22 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 22 Apr 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Xerte Online Toolkits versions 3.15 and earlier contain an incomplete input validation vulnerability in the elFinder connector endpoint that fails to block PHP-executable extensions .php4 due to an incorrect regex pattern. Unauthenticated attackers can exploit this flaw combined with authentication bypass and path traversal vulnerabilities to upload malicious PHP code, rename it with a .php4 extension, and execute arbitrary operating system commands on the server. | |
| Title | Xerte Online Toolkits File Upload RCE via elfinder Connector | |
| Weaknesses | CWE-184 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-22T19:29:58.721Z
Reserved: 2026-03-27T15:24:06.752Z
Link: CVE-2026-34415
Updated: 2026-04-22T19:29:52.180Z
Status : Received
Published: 2026-04-22T19:17:04.253
Modified: 2026-04-22T19:17:04.253
Link: CVE-2026-34415
No data.
OpenCVE Enrichment
No data.