Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-34414
PUBLISHED
More InfoOfficial Page
Assigner-VulnCheck
Assigner Org ID-83251b91-4cc7-4094-a5c7-464a1b83ea10
View Known Exploited Vulnerability (KEV) details
Published At-22 Apr, 2026 | 18:32
Updated At-29 Apr, 2026 | 13:46
Rejected At-
▼CVE Numbering Authority (CNA)
Xerte Online Toolkits Path Traversal via connector.php

Xerte Online Toolkits versions 3.15 and earlier contain a relative path traversal vulnerability in the elFinder connector endpoint at /editor/elfinder/php/connector.php where the name parameter in rename commands is not sanitized for path traversal sequences. Attackers can supply a name value containing directory traversal sequences to move files from project media directories to arbitrary locations on the filesystem, potentially overwriting application files, achieving stored cross-site scripting, or combining with other vulnerabilities to achieve unauthenticated remote code execution by moving PHP code files to the application root.

Affected Products
Vendor
thexerteproject
Product
xerteonlinetoolkits
Repo
https://github.com/thexerteproject/xerteonlinetoolkits
Default Status
unaffected
Versions
Affected
  • 3.15.0 (semver)
  • 3.14.0 (semver)
  • 3.13.0 (semver)
  • From 0 before 02661be88cc369325ea01b508086bde7fbfec805 (git)
  • From 0 before 17e4f945fe6a3400fa88c01eda18c1075ee4a212 (git)
  • From 0 before 507d55c5e91bf9310b5b1c7fad8aebfef902ad23 (git)
Problem Types
TypeCWE IDDescription
CWECWE-22CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Type: CWE
CWE ID: CWE-22
Description: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Metrics
VersionBase scoreBase severityVector
4.07.1HIGH
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N
3.17.1HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N
Version: 4.0
Base score: 7.1
Base severity: HIGH
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N
Version: 3.1
Base score: 7.1
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

finder
bootstrapbool
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/bootstrapbool/xerteonlinetoolkits-rce
technical-description
exploit
https://xerte.org.uk/xertetoolkits_3.15_ChangeLog.html
release-notes
https://xerte.org.uk/index.php/en/downloads-1/category/3-xerte-online-toolkits
product
permissions-required
https://github.com/thexerteproject/xerteonlinetoolkits/issues/1527
issue-tracking
https://github.com/thexerteproject/xerteonlinetoolkits/commit/02661be88cc369325ea01b508086bde7fbfec805
patch
https://github.com/thexerteproject/xerteonlinetoolkits/commit/17e4f945fe6a3400fa88c01eda18c1075ee4a212
patch
https://github.com/thexerteproject/xerteonlinetoolkits/commit/507d55c5e91bf9310b5b1c7fad8aebfef902ad23
patch
https://www.vulncheck.com/advisories/xerte-online-toolkits-path-traversal-via-connector-php
third-party-advisory
Hyperlink: https://github.com/bootstrapbool/xerteonlinetoolkits-rce
Resource:
technical-description
exploit
Hyperlink: https://xerte.org.uk/xertetoolkits_3.15_ChangeLog.html
Resource:
release-notes
Hyperlink: https://xerte.org.uk/index.php/en/downloads-1/category/3-xerte-online-toolkits
Resource:
product
permissions-required
Hyperlink: https://github.com/thexerteproject/xerteonlinetoolkits/issues/1527
Resource:
issue-tracking
Hyperlink: https://github.com/thexerteproject/xerteonlinetoolkits/commit/02661be88cc369325ea01b508086bde7fbfec805
Resource:
patch
Hyperlink: https://github.com/thexerteproject/xerteonlinetoolkits/commit/17e4f945fe6a3400fa88c01eda18c1075ee4a212
Resource:
patch
Hyperlink: https://github.com/thexerteproject/xerteonlinetoolkits/commit/507d55c5e91bf9310b5b1c7fad8aebfef902ad23
Resource:
patch
Hyperlink: https://www.vulncheck.com/advisories/xerte-online-toolkits-path-traversal-via-connector-php
Resource:
third-party-advisory
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found