Description
HRConvert2 is a self-hosted, drag-and-drop & nosql file conversion server & share tool. Prior to 3.3.8, the sanitizeString() function in convertCore.php is missing backtick (`) and tab (\t) from its strip list. User input then reaches shell_exec(), where the shell interprets these characters and commands within filenames execute. This vulnerability is fixed in 3.3.8.
Published: 2026-05-14
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

HRConvert2 is a file conversion and sharing tool that accepts user‑specified filenames. Prior to version 3.3.8, the sanitizeString() function omitted backticks (`) and tab ( ) from its list of characters to strip, meaning that user input could be forwarded to PHP’s shell_exec() without proper sanitization. As a result, a malicious user could construct a filename containing shell metacharacters and cause the server to execute an arbitrary command. This vulnerability permits unauthenticated remote command execution, compromising confidentiality, integrity, and availability of the affected system.

Affected Systems

The affected product is HRConvert2 from vendor zelon88. Versions prior to 3.3.8 are vulnerable; the fix was introduced in release 3.3.8. No information on specific build numbers or operating systems is given, so all installations running an earlier release should be considered exposed.

Risk and Exploitability

The CVSS score of 9.3 signals a critical vulnerability. While the EPSS score is not available, the lack of public exploitation and absence from the CISA KEV catalog suggest that the probability of an attacker successfully exploiting the flaw is uncertain, but the potential impact is catastrophic if a public instance is found. Attackers with unauthenticated remote access to HRConvert2 can take advantage of the missing sanitization in convertCore.php; a specially crafted filename containing backticks or tab characters will be passed to shell_exec, allowing execution of arbitrary shell commands. This leads to full compromise of the host, including data theft, manipulation, and service disruption.

Generated by OpenCVE AI on May 14, 2026 at 21:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade HRConvert2 to version 3.3.8 or newer, which includes the missing input sanitization fix.
  • Disable or remove the shell_exec() functionality in convertCore.php if an upgrade cannot be performed immediately, thereby preventing command execution via filenames.
  • Restore a backup or ensure strict access controls on the HRConvert2 installation to limit the reach of the server to trusted networks, reducing the risk of unauthenticated exploitation.

Generated by OpenCVE AI on May 14, 2026 at 21:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 15 May 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 15 May 2026 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Zelon88
Zelon88 hrconvert2
Vendors & Products Zelon88
Zelon88 hrconvert2

Thu, 14 May 2026 20:45:00 +0000

Type Values Removed Values Added
Description HRConvert2 is a self-hosted, drag-and-drop & nosql file conversion server & share tool. Prior to 3.3.8, the sanitizeString() function in convertCore.php is missing backtick (`) and tab (\t) from its strip list. User input then reaches shell_exec(), where the shell interprets these characters and commands within filenames execute. This vulnerability is fixed in 3.3.8.
Title HRConvert2: Missing Sanitization enables Unauthenticated Remote Command Execution
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L'}


Subscriptions

Zelon88 Hrconvert2
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-15T13:34:48.461Z

Reserved: 2026-05-07T16:20:08.659Z

Link: CVE-2026-44666

cve-icon Vulnrichment

Updated: 2026-05-15T13:34:35.657Z

cve-icon NVD

Status : Deferred

Published: 2026-05-14T21:16:47.370

Modified: 2026-05-15T15:16:53.630

Link: CVE-2026-44666

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T11:21:04Z

Weaknesses