<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CVE-2026-34413 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-34413/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 24 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-34413/feed.xml" rel="self" type="application/rss+xml"/><item><title>Xerte Online Toolkits Unauthenticated Remote Code Execution via elFinder Connector</title><link>https://feed.craftedsignal.io/briefs/2024-01-xerte-rce/</link><pubDate>Wed, 24 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-xerte-rce/</guid><description>Xerte Online Toolkits versions 3.15 and earlier are vulnerable to unauthenticated remote code execution due to a missing authentication check in the elFinder connector, allowing arbitrary file operations that can be chained with other vulnerabilities.</description><content:encoded><![CDATA[<p>Xerte Online Toolkits, a web-based open-source e-learning content creation platform, is vulnerable to a critical remote code execution vulnerability (CVE-2026-34413) affecting versions 3.15 and earlier. The vulnerability lies within the elFinder connector endpoint at <code>/editor/elfinder/php/connector.php</code>, which lacks proper authentication. This allows unauthenticated attackers to bypass intended access controls and directly interact with the file management system. Attackers can leverage this flaw to perform unauthorized file operations, including creating, uploading, renaming, duplicating, overwriting, and deleting files within project media directories. This can be chained with path traversal and extension blocklist bypass vulnerabilities to ultimately achieve remote code execution and arbitrary file read on the affected server.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a malicious HTTP request to <code>/editor/elfinder/php/connector.php</code> targeting the elFinder file manager.</li>
<li>Due to the missing authentication check, the server processes the request without validating the user&rsquo;s identity.</li>
<li>The attacker leverages the file operation functionalities (create, upload, rename, duplicate, overwrite, delete) of elFinder.</li>
<li>The attacker exploits a path traversal vulnerability to navigate outside the intended media directory.</li>
<li>The attacker uploads a malicious PHP file with a bypassed extension filter (e.g., using double extensions or null byte injection).</li>
<li>The attacker renames the uploaded file to a valid PHP extension (e.g., <code>.php</code>).</li>
<li>The attacker sends an HTTP request to the renamed PHP file, triggering server-side execution.</li>
<li>The attacker achieves remote code execution on the server, allowing for arbitrary system commands and data access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability grants unauthenticated attackers the ability to execute arbitrary code on the Xerte Online Toolkits server. This can lead to complete system compromise, data theft, defacement of the learning platform, and denial of service. The severity is high due to the ease of exploitation and the potential for widespread impact across educational institutions and organizations utilizing Xerte Online Toolkits for e-learning content delivery.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the latest security patches or upgrade to a version of Xerte Online Toolkits greater than 3.15 to address CVE-2026-34413.</li>
<li>Implement the Sigma rule <code>Detect Unauthenticated elFinder Connector Access</code> to identify unauthorized access attempts to the vulnerable endpoint.</li>
<li>Review and harden file upload policies to prevent the upload of potentially malicious file types, mitigating the risk of chained exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>CVE-2026-34413</category><category>xerte</category><category>rce</category></item></channel></rss>