efw4.X is an Enterprise Framework for Web. Prior to 4.08.010, the elfinder_checkRisk function validates target and targets for path traversal and home containment, but does not validate the dst (destination) parameter used by elfinder_paste. An attacker can copy or move files from within the home directory to any arbitrary destination by setting dst to a base64-encoded traversal path. This bypasses the protected=true security control. This vulnerability is fixed in 4.08.010.
Metrics
Affected Vendors & Products
References
History
Wed, 13 May 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Efwgrp
Efwgrp efw4.x |
|
| Vendors & Products |
Efwgrp
Efwgrp efw4.x |
Tue, 12 May 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | efw4.X is an Enterprise Framework for Web. Prior to 4.08.010, the elfinder_checkRisk function validates target and targets for path traversal and home containment, but does not validate the dst (destination) parameter used by elfinder_paste. An attacker can copy or move files from within the home directory to any arbitrary destination by setting dst to a base64-encoded traversal path. This bypasses the protected=true security control. This vulnerability is fixed in 4.08.010. | |
| Title | efw4.X: Path Traversal via Unchecked dst Parameter leads to Remote Code Execution | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-05-12T21:05:06.569Z
Updated: 2026-05-12T21:05:06.569Z
Reserved: 2026-05-05T16:33:55.844Z
Link: CVE-2026-44258
No data.
Status : Received
Published: 2026-05-12T22:16:36.127
Modified: 2026-05-12T22:16:36.127
Link: CVE-2026-44258
No data.