CVE-2026-34413 - Vulnerability Analysis
HighCVSS: 8.6Last Updated: April 22, 2026
Xerte Online Toolkits - Broken Access Control
Published: April 22, 2026Updated: April 22, 2026Remote Exploitable
Overview
Xerte Online Toolkits <= 3.15 contains a broken access control vulnerability caused by missing exit() after HTTP redirect in elFinder connector at /editor/elfinder/php/connector.php, letting unauthenticated attackers perform file operations and potentially achieve remote code execution, exploit requires no authentication.
Severity & Score
Severity: High
CVSS Score: 8.6
Impact
Unauthenticated attackers can manipulate files and potentially execute code remotely, risking full server compromise.
Mitigation
Update to the latest version beyond 3.15.
References
- https://github.com/thexerteproject/xerteonlinetoolkits/commit/02661be88cc369325ea01b508086bde7fbfec805
- https://github.com/thexerteproject/xerteonlinetoolkits/commit/17e4f945fe6a3400fa88c01eda18c1075ee4a212
- https://github.com/thexerteproject/xerteonlinetoolkits/commit/507d55c5e91bf9310b5b1c7fad8aebfef902ad23
- https://github.com/thexerteproject/xerteonlinetoolkits/issues/1527
- https://www.vulncheck.com/advisories/xerte-online-toolkits-missing-authentication-via-connector-php
- https://xerte.org.uk/index.php/en/downloads-1/category/3-xerte-online-toolkits
- https://xerte.org.uk/xertetoolkits_3.15_ChangeLog.html
Related Resources
Details
- CVE ID
- CVE-2026-34413
- Severity
- High
- CVSS Score
- 8.6
- Type
- broken_access_control
- Status
- rejected
CWE
- CWE-497
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L