efw4.X is an Enterprise Framework for Web. Prior to 4.08.010, the readonly flag set on the <efw:elFinder> JSP tag is intended to prevent file modifications. When protected=true, elfinder_checkRisk enforces that the client sends readonly=true (matching the session value), but no event handler checks the readonly value before performing write operations. The flag only controls client-side UI elements (disabling buttons) and response metadata (write: 0, locked: 1). An attacker who sends requests directly (bypassing the UI) can perform all file operations despite readonly=true. This vulnerability is fixed in 4.08.010.
History

Wed, 13 May 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Efwgrp
Efwgrp efw4.x
Vendors & Products Efwgrp
Efwgrp efw4.x

Tue, 12 May 2026 21:30:00 +0000

Type Values Removed Values Added
Description efw4.X is an Enterprise Framework for Web. Prior to 4.08.010, the readonly flag set on the <efw:elFinder> JSP tag is intended to prevent file modifications. When protected=true, elfinder_checkRisk enforces that the client sends readonly=true (matching the session value), but no event handler checks the readonly value before performing write operations. The flag only controls client-side UI elements (disabling buttons) and response metadata (write: 0, locked: 1). An attacker who sends requests directly (bypassing the UI) can perform all file operations despite readonly=true. This vulnerability is fixed in 4.08.010.
Title efw4.X: readonly Flag Not Enforced Server-Side
Weaknesses CWE-863
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2026-05-12T21:09:34.549Z

Updated: 2026-05-12T21:09:34.549Z

Reserved: 2026-05-05T16:33:55.844Z

Link: CVE-2026-44260

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-12T22:16:36.417

Modified: 2026-05-12T22:16:36.417

Link: CVE-2026-44260

cve-icon Redhat

No data.