


Perceptive Security
SOC/SIEM Consultancy

Xerte Online Toolkits versions 3.15 and earlier contain a relative path traversal vulnerability in the elFinder connector endpoint at /editor/elfinder/php/conne…
Published:
21 April 2026 at 22:00:00
Alert date:
22 April 2026 at 20:02:14
Source:
nvd.nist.gov
Web Technologies, Enterprise Applications
Xerte Online Toolkits versions 3.15 and earlier contain a critical path traversal vulnerability in the elFinder connector endpoint. The vulnerability exists in /editor/elfinder/php/connector.php where the name parameter in rename commands is not properly sanitized. Attackers can exploit this by supplying directory traversal sequences to move files from project media directories to arbitrary filesystem locations. This can lead to overwriting application files, achieving stored cross-site scripting, or combining with other vulnerabilities for unauthenticated remote code execution. The vulnerability allows moving PHP code files to the application root, significantly increasing the attack surface and potential for system compromise.
Technical details
Mitigation steps:
Affected products:
Xerte Online Toolkits
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-34414
https://github.com/thexerteproject/xerteonlinetoolkits/commit/02661be88cc369325ea01b508086bde7fbfec805
https://github.com/thexerteproject/xerteonlinetoolkits/commit/17e4f945fe6a3400fa88c01eda18c1075ee4a212
https://github.com/thexerteproject/xerteonlinetoolkits/commit/507d55c5e91bf9310b5b1c7fad8aebfef902ad23
https://github.com/thexerteproject/xerteonlinetoolkits/issues/1527
https://www.vulncheck.com/advisories/xerte-online-toolkits-path-traversal-via-connector-php
https://xerte.org.uk/index.php/en/downloads-1/category/3-xerte-online-toolkits
https://xerte.org.uk/xertetoolkits_3.15_ChangeLog.html
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
