Xerte Online Toolkits CVE-2026-34413

| EUVD-2026-25067 HIGH
Exposure of Sensitive System Information to an Unauthorized Control Sphere (CWE-497)
2026-04-22 VulnCheck GHSA-g35c-vgp7-f8qm
8.8
CVSS 4.0
Share

CVSS VectorNVD

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
X

Lifecycle Timeline

3
Re-analysis Queued
Apr 24, 2026 - 20:22 vuln.today
cvss_changed
Analysis Generated
Apr 23, 2026 - 06:58 vuln.today
CVSS changed
Apr 22, 2026 - 19:22 NVD
8.6 (HIGH) 8.8 (HIGH)

DescriptionNVD

Xerte Online Toolkits versions 3.15 and earlier contain a missing authentication vulnerability in the elFinder connector endpoint at /editor/elfinder/php/connector.php where an HTTP redirect to unauthenticated callers does not call exit() or die(), allowing PHP execution to continue and process the full request server-side. Unauthenticated attackers can perform file operations on project media directories including creating directories, uploading files, renaming files, duplicating files, overwriting files, and deleting files, which can be chained with path traversal and extension blocklist vulnerabilities to achieve remote code execution and arbitrary file read.

AnalysisAI

Unauthenticated attackers can execute remote code and read arbitrary files in Xerte Online Toolkits 3.15 and earlier via a missing authentication flaw in the elFinder connector endpoint. The vulnerability stems from a logic error where HTTP redirects for unauthenticated requests fail to terminate PHP execution, allowing full server-side processing of file operations. …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

Within 24 hours: Identify all Xerte Online Toolkits instances and confirm versions ≤3.15.0; isolate affected servers from internet access if patching cannot occur immediately. Within 7 days: Apply vendor patch via GitHub commits addressing versions 3.13.0-3.15.0 (consult vendor release notes for specific version guidance); test file upload and access controls in staging before production deployment. …

Sign in for detailed remediation steps.

Share

CVE-2026-34413 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy