Impact
A flaw in Xerte Online Toolkits allows an attacker to upload a ZIP archive that contains PHP code without needing to authenticate. When the system imports the template, the archive is extracted into a public web directory, and the malicious script can then be accessed via a browser and run on the server. This defect is consistent with missing authentication (CWE‑306) and arbitrary file upload (CWE‑434), enabling a complete takeover of the application’s execution environment.
Affected Systems
Xerte Online Toolkits version 3.14 and all earlier releases are affected. Users running these releases should verify the exact build; newer versions of the toolkit are not known to be impacted.
Risk and Exploitability
The impact score of 9.3 indicates critical severity. The EPSS score is below 1 %, suggesting a low current detection probability, and the vulnerability is not listed in the CISA KEV catalog. Because the upload can be performed without authentication, the likely attack vector is remote over the internet. Exploitation requires only knowledge of the vulnerable endpoint and the ability to craft a ZIP containing a PHP payload.
OpenCVE Enrichment