Description
Xerte Online Toolkits versions 3.15 and earlier contain an incomplete input validation vulnerability in the elFinder connector endpoint that fails to block PHP-executable extensions .php4 due to an incorrect regex pattern. Unauthenticated attackers can exploit this flaw combined with authentication bypass and path traversal vulnerabilities to upload malicious PHP code, rename it with a .php4 extension, and execute arbitrary operating system commands on the server.
Published: 2026-04-22
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote code execution via file upload
Action: Immediate Patch
AI Analysis

Impact

Xerte Online Toolkits versions 3.15 and earlier expose an incomplete input validation flaw in the elFinder connector endpoint. The flaw originates from an incorrect regular‑expression that fails to block PHP‑executable extensions such as .php4. An attacker can exploit this oversight by uploading a PHP file, renaming it with a .php4 extension, then accessing it to execute arbitrary operating‑system commands. This flaw is further amplified when combined with existing authentication bypass and path‑traversal weaknesses, allowing the attacker to perform the upload unauthenticated. The weakness corresponds to CWE‑184, representing the erroneous use of a regular expression for input validation.

Affected Systems

The affected publisher is the xerteproject’s Xerte Online Toolkits. All releases with a version number of 3.15 or earlier are vulnerable, including any derivative or locally modified installations that have not applied the fix. Users running these versions should verify their current build and confirm whether it matches or falls below 3.15.

Risk and Exploitability

The CVSS score of 9.3 indicates a high severity level. While an EPSS score is not available, the combination of unauthenticated upload capability, exploitable file naming and a path traversal or authentication bypass route provides a clear and straightforward attack vector for an adversary. The vulnerability is not listed in the CISA KEV catalog, suggesting there are no known mass‑distribution exploits yet, but the potential for silent, remote command execution in a server environment makes the risk significant. Implementing an update or mitigation should be treated as a high‑priority action.

Generated by OpenCVE AI on April 27, 2026 at 08:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Xerte Online Toolkits to the latest release that incorporates the elFinder connector patch (any version beyond 3.15 includes the fix).
  • If an immediate upgrade is not feasible, restrict access to the elFinder connector endpoint by using server‑level firewall rules or IP whitelisting, or disable the connector entirely until a patch can be applied.
  • Configure the web server to reject uploads of PHP‑executable extensions (.php, .php5, .php4, etc.) by adjusting MIME type handling or using a .htaccess rule that returns a 403 status for such files.

Generated by OpenCVE AI on April 27, 2026 at 08:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Thexerteproject
Thexerteproject xerteonlinetoolkits
Vendors & Products Thexerteproject
Thexerteproject xerteonlinetoolkits

Fri, 24 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
References

Wed, 22 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 22 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
Description Xerte Online Toolkits versions 3.15 and earlier contain an incomplete input validation vulnerability in the elFinder connector endpoint that fails to block PHP-executable extensions .php4 due to an incorrect regex pattern. Unauthenticated attackers can exploit this flaw combined with authentication bypass and path traversal vulnerabilities to upload malicious PHP code, rename it with a .php4 extension, and execute arbitrary operating system commands on the server.
Title Xerte Online Toolkits File Upload RCE via elfinder Connector
Weaknesses CWE-184
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Thexerteproject Xerteonlinetoolkits
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-24T19:30:19.259Z

Reserved: 2026-03-27T15:24:06.752Z

Link: CVE-2026-34415

cve-icon Vulnrichment

Updated: 2026-04-22T19:29:52.180Z

cve-icon NVD

Status : Deferred

Published: 2026-04-22T19:17:04.253

Modified: 2026-04-24T20:16:25.387

Link: CVE-2026-34415

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-27T19:53:15Z

Weaknesses