LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-34415

CVE-2026-34415 - Vulnerability Analysis

CriticalCVSS: 9.8

Last Updated: April 22, 2026

Xerte Online Toolkits - Command Injection

Published: April 22, 2026Updated: April 22, 2026Remote Exploitable

Overview

Xerte Online Toolkits <= 3.15 contains a command injection caused by incomplete input validation in elFinder connector allowing .php4 extensions, letting unauthenticated attackers execute arbitrary OS commands via upload and rename, exploit requires no authentication.

Severity & Score

Severity: Critical
CVSS Score: 9.8
EPSS Score: 18.9%(Probability of exploitation in next 30 days)

Impact

Unauthenticated attackers can execute arbitrary operating system commands, potentially leading to full server compromise.

Mitigation

Update to the latest version beyond 3.15.

Social Media Activity(1 post)

OffSequence
OffSequence
@offseq
Apr 23, 2026

⚠️ CRITICAL: xerteonlinetoolkits ≤3.15 has incomplete input validation in elFinder — .php4 files can be uploaded & executed, enabling unauth RCE. Restrict endpoint, monitor uploads, apply custom filters. Patch status unknown. CVE-2026-34415 https://radar.offseq.com/threat/cve-2026-34415-cwe-184-incomplete-list-of-disallow-f774ae94 #OffSeq #Vuln #RCE

View original post

Details

CVE ID
CVE-2026-34415
Severity
Critical
CVSS Score
9.8
Type
command_injection
Status
rejected
EPSS
18.9%
Social Posts
1

CWE

  • CWE-184

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS Score

18.9%Probability of exploitation in the next 30 days