CVE-2026-34415

Xerte · Online Toolkits

Xerte Online Toolkits 3.15 and earlier allow unauthenticated attackers to upload and execute malicious PHP code via an elFinder connector flaw.

Executive summary

A critical vulnerability in Xerte Online Toolkits 3.15 and earlier allows unauthenticated attackers to perform remote code execution through improper input validation and file upload bypasses.

Vulnerability

This is a remote code execution vulnerability stemming from incomplete input validation in the elFinder connector, which allows attackers to upload files with dangerous extensions like .php4.

Business impact

This flaw permits unauthenticated attackers to gain arbitrary operating system command execution, effectively granting them control over the underlying server. The potential for data theft, ransomware deployment, and complete service disruption is extreme. The CVSS score of 9.8 confirms that this is a critical-severity issue requiring immediate attention.

Remediation

Immediate Action: Update Xerte Online Toolkits to the latest version immediately to patch the elFinder connector vulnerability.

Proactive Monitoring: Review file upload directories for unauthorized files, particularly those with unconventional PHP extensions such as .php4 or .php5.

Compensating Controls: Configure web servers to explicitly deny execution of scripts in user-writable directories and implement strict file type validation at the WAF level.

Exploitation status

Public Exploit Available: Unknown

Analyst recommendation

The combination of unauthenticated access and remote code execution makes this a severe risk to all Xerte deployments. Administrators must ensure their systems are updated to the latest available version to close this critical security gap.