Description
A vulnerability was determined in prasathmani TinyFileManager up to 2.6. Affected by this vulnerability is an unknown functionality of the file /filemanager.php?p= ajax=true&type=upload of the component File Upload Handler. This manipulation of the argument uploadurl causes server-side request forgery. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-04-17
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Server‑Side Request Forgery
Action: Patch
AI Analysis

Impact

The vulnerability lies in the file manager.php endpoint of TinyFileManager 2.6 and earlier. An attacker can manipulate the uploadurl parameter in the File Upload Handler. This allows the server to issue HTTP requests to arbitrary URLs, enabling server‑side request forgery. The flaw can be triggered remotely, and the exploit is already publicly disclosed. By abusing the vulnerability an attacker may cause the application to communicate with internal systems, leak sensitive data, or perform unintended actions on third‑party services.

Affected Systems

Prasathmani TinyFileManager up to version 2.6 is affected. The flaw exists within the File Upload feature accessed via /filemanager.php?p=ajax=true&type=upload. No specific sub‑versions are listed beyond the known maximum of 2.6, and the vendor has not released a fix for this release cycle.

Risk and Exploitability

The CVSS score is 5.3, indicating a moderate severity. No EPSS data is available, and the vulnerability is not in CISA KEV. The attack vector is remote web‑based access to the affected endpoint; the exploitation does not require authentication, but the attacker needs to be able to send a crafted request to the server. Because the flaw is publicly disclosed and the server performs outbound requests, the risk to exposed services is tangible and should be addressed without delay.

Generated by OpenCVE AI on April 18, 2026 at 09:15 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Obtain and apply the official patch or security update from the vendor as soon as it is released.
  • Restrict access to the /filemanager.php endpoint using web‑server or firewall rules to limit exposure of the vulnerable feature.
  • If the upload functionality is unnecessary, disable or remove the File Upload Handler from the application.
  • If a patch is unavailable, consider temporarily disabling the uploadurl parameter or sanitizing its input to prevent SSRF.

Generated by OpenCVE AI on April 18, 2026 at 09:15 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 17 Apr 2026 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Prasathmani
Prasathmani tiny File Manager
Vendors & Products Prasathmani
Prasathmani tiny File Manager

Fri, 17 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 17 Apr 2026 15:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in prasathmani TinyFileManager up to 2.6. Affected by this vulnerability is an unknown functionality of the file /filemanager.php?p= ajax=true&type=upload of the component File Upload Handler. This manipulation of the argument uploadurl causes server-side request forgery. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Title prasathmani TinyFileManager File Upload filemanager.php server-side request forgery
Weaknesses CWE-918
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Prasathmani Tiny File Manager
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-17T18:39:49.310Z

Reserved: 2026-04-17T08:39:27.561Z

Link: CVE-2026-6497

cve-icon Vulnrichment

Updated: 2026-04-17T18:39:41.715Z

cve-icon NVD

Status : Deferred

Published: 2026-04-17T16:17:07.763

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-6497

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T09:30:25Z

Weaknesses