elFinder MySQL Volume Driver SQL Injection (CVE-2026-44521)
An authenticated SQL injection vulnerability (CVE-2026-44521) exists in the elFinder MySQL volume driver (`elFinderVolumeMySQL`) allowing any logged-in user, including read-only users, to inject SQL through a crafted `target` file hash leading to unauthorized data disclosure and denial of service.
The elFinder file manager is vulnerable to SQL injection within its MySQL volume driver (elFinderVolumeMySQL). This flaw, identified as CVE-2026-44521, permits any authenticated user, even those with read-only privileges on the affected volume, to inject SQL commands by manipulating the target parameter with a crafted file hash. This vulnerability specifically impacts elFinder installations configured to utilize the MySQL volume driver, while those employing the default LocalFileSystem driver remain unaffected. The vulnerability exists due to the system’s failure to validate decoded file hashes as valid MySQL object identifiers before their inclusion in queries.
Attack Chain
- Attacker authenticates to elFinder with a valid user account.
- Attacker identifies the elFinder instance is using the MySQL volume driver.
- Attacker crafts a malicious
targetparameter containing a SQL injection payload encoded as a file hash. - Attacker sends a request to elFinder with the crafted
targetparameter, triggering one of the vulnerable functions:cacheDir(),_joinPath(),_stat(), or_fopen(). - elFinder decodes the file hash without proper validation.
- The decoded SQL injection payload is incorporated into a MySQL query.
- The injected SQL command executes against the MySQL database, potentially extracting sensitive data or causing a denial of service.
- Attacker retrieves the leaked data or observes the degraded performance due to the denial-of-service condition.
Impact
Successful exploitation allows an authenticated user, even one with read-only access, to disclose data accessible to the configured MySQL account, including file contents stored by the driver and database metadata. It can also trigger denial of service through expensive or broad query results. The severity depends on the MySQL account privileges. Affected packages include composer/studio-42/elfinder versions 2.1.67 and earlier.
Recommendation
- Upgrade
composer/studio-42/elfinderto a version later than 2.1.67 to patch CVE-2026-44521. - Deploy the Sigma rule “Detect elFinder SQL Injection Attempt via Target Parameter” to identify exploitation attempts by monitoring requests with potentially malicious file hashes in the
targetparameter. - Consider using the default
LocalFileSystemdriver if theMySQLvolume driver is not a requirement to mitigate CVE-2026-44521.
Detection coverage 2
Detect elFinder SQL Injection Attempt via Target Parameter
highDetects CVE-2026-44521 exploitation — SQL injection attempts in elFinder through the `target` parameter, indicated by SQL-related keywords.
Detect elFinder MySQL Volume Driver in Use
infoDetects the usage of the MySQL volume driver in elFinder configurations, which is a prerequisite for CVE-2026-44521 exploitation.
Detection queries are available on the platform. Get full rules →