Gibbon versions before v30.0.01 are affected by a local file inclusion vulnerability resulting in RCE by changing the report archive directory and forcing interpretation of a user provided .zip as PHP. Successful exploitation requires Teacher or higher privileges. Exploitation could result in compromise of the underlying web server.
History

Sat, 09 May 2026 07:45:00 +0000

Type Values Removed Values Added
First Time appeared Gibbonedu
Gibbonedu gibbon
Vendors & Products Gibbonedu
Gibbonedu gibbon

Sat, 09 May 2026 05:45:00 +0000

Type Values Removed Values Added
Title Local File Inclusion Leading to Remote Code Execution via Misconfigured Archive Directory in Gibbon

Sat, 09 May 2026 04:15:00 +0000

Type Values Removed Values Added
Description Gibbon versions before v30.0.01 are affected by a local file inclusion vulnerability resulting in RCE by changing the report archive directory and forcing interpretation of a user provided .zip as PHP. Successful exploitation requires Teacher or higher privileges. Exploitation could result in compromise of the underlying web server.
Weaknesses CWE-98
References
Metrics cvssV4_0

{'score': 8.9, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: PRJBLK

Published: 2026-05-09T02:58:43.887Z

Updated: 2026-05-09T02:59:32.518Z

Reserved: 2026-05-09T02:47:18.032Z

Link: CVE-2026-8208

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-09T04:16:27.287

Modified: 2026-05-09T04:16:27.287

Link: CVE-2026-8208

cve-icon Redhat

No data.