CVE-2026-34415 PUBLISHED

Xerte Online Toolkits File Upload RCE via elfinder Connector

Assigner: VulnCheck
Reserved: 27.03.2026 Published: 22.04.2026 Updated: 22.04.2026

Xerte Online Toolkits versions 3.15 and earlier contain an incomplete input validation vulnerability in the elFinder connector endpoint that fails to block PHP-executable extensions .php4 due to an incorrect regex pattern. Unauthenticated attackers can exploit this flaw combined with authentication bypass and path traversal vulnerabilities to upload malicious PHP code, rename it with a .php4 extension, and execute arbitrary operating system commands on the server.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 9.3

Product Status

Vendor thexerteproject
Product xerteonlinetoolkits
Versions Default: unaffected
  • Version 3.15.0 is affected
  • Version 3.14.0 is affected
  • Version 3.13.0 is affected
  • affected from 0 to 02661be88cc369325ea01b508086bde7fbfec805 (excl.)
  • affected from 0 to 17e4f945fe6a3400fa88c01eda18c1075ee4a212 (excl.)
  • affected from 0 to 507d55c5e91bf9310b5b1c7fad8aebfef902ad23 (excl.)

Credits

  • bootstrapbool finder

References

Problem Types

  • CWE-184 Incomplete List of Disallowed Inputs CWE