Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2026-34415
Deferred
More InfoOfficial Page
Source-disclosure@vulncheck.com
View Known Exploited Vulnerability (KEV) details
Published At-22 Apr, 2026 | 19:17
Updated At-24 Apr, 2026 | 20:16

Xerte Online Toolkits versions 3.15 and earlier contain an incomplete input validation vulnerability in the elFinder connector endpoint that fails to block PHP-executable extensions .php4 due to an incorrect regex pattern. Unauthenticated attackers can exploit this flaw combined with authentication bypass and path traversal vulnerabilities to upload malicious PHP code, rename it with a .php4 extension, and execute arbitrary operating system commands on the server.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.09.3CRITICAL
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Secondary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 4.0
Base score: 9.3
Base severity: CRITICAL
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Secondary
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-184Secondarydisclosure@vulncheck.com
CWE ID: CWE-184
Type: Secondary
Source: disclosure@vulncheck.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/bootstrapbool/xerteonlinetoolkits-rcedisclosure@vulncheck.com
N/A
https://github.com/thexerteproject/xerteonlinetoolkits/commit/02661be88cc369325ea01b508086bde7fbfec805disclosure@vulncheck.com
N/A
https://github.com/thexerteproject/xerteonlinetoolkits/commit/17e4f945fe6a3400fa88c01eda18c1075ee4a212disclosure@vulncheck.com
N/A
https://github.com/thexerteproject/xerteonlinetoolkits/commit/507d55c5e91bf9310b5b1c7fad8aebfef902ad23disclosure@vulncheck.com
N/A
https://github.com/thexerteproject/xerteonlinetoolkits/issues/1527disclosure@vulncheck.com
N/A
https://www.vulncheck.com/advisories/xerte-online-toolkits-file-upload-rce-via-elfinder-connectordisclosure@vulncheck.com
N/A
https://xerte.org.uk/index.php/en/downloads-1/category/3-xerte-online-toolkitsdisclosure@vulncheck.com
N/A
https://xerte.org.uk/xertetoolkits_3.15_ChangeLog.htmldisclosure@vulncheck.com
N/A
Hyperlink: https://github.com/bootstrapbool/xerteonlinetoolkits-rce
Source: disclosure@vulncheck.com
Resource: N/A
Hyperlink: https://github.com/thexerteproject/xerteonlinetoolkits/commit/02661be88cc369325ea01b508086bde7fbfec805
Source: disclosure@vulncheck.com
Resource: N/A
Hyperlink: https://github.com/thexerteproject/xerteonlinetoolkits/commit/17e4f945fe6a3400fa88c01eda18c1075ee4a212
Source: disclosure@vulncheck.com
Resource: N/A
Hyperlink: https://github.com/thexerteproject/xerteonlinetoolkits/commit/507d55c5e91bf9310b5b1c7fad8aebfef902ad23
Source: disclosure@vulncheck.com
Resource: N/A
Hyperlink: https://github.com/thexerteproject/xerteonlinetoolkits/issues/1527
Source: disclosure@vulncheck.com
Resource: N/A
Hyperlink: https://www.vulncheck.com/advisories/xerte-online-toolkits-file-upload-rce-via-elfinder-connector
Source: disclosure@vulncheck.com
Resource: N/A
Hyperlink: https://xerte.org.uk/index.php/en/downloads-1/category/3-xerte-online-toolkits
Source: disclosure@vulncheck.com
Resource: N/A
Hyperlink: https://xerte.org.uk/xertetoolkits_3.15_ChangeLog.html
Source: disclosure@vulncheck.com
Resource: N/A
Change History
0Changes found

Details not found