<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Elfinder — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/elfinder/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 11 May 2026 16:13:41 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/elfinder/feed.xml" rel="self" type="application/rss+xml"/><item><title>elFinder MySQL Volume Driver SQL Injection (CVE-2026-44521)</title><link>https://feed.craftedsignal.io/briefs/2026-05-elfinder-sqli/</link><pubDate>Mon, 11 May 2026 16:13:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-elfinder-sqli/</guid><description>An authenticated SQL injection vulnerability (CVE-2026-44521) exists in the elFinder MySQL volume driver (`elFinderVolumeMySQL`) allowing any logged-in user, including read-only users, to inject SQL through a crafted `target` file hash leading to unauthorized data disclosure and denial of service.</description><content:encoded><![CDATA[<p>The elFinder file manager is vulnerable to SQL injection within its MySQL volume driver (<code>elFinderVolumeMySQL</code>). This flaw, identified as CVE-2026-44521, permits any authenticated user, even those with read-only privileges on the affected volume, to inject SQL commands by manipulating the <code>target</code> parameter with a crafted file hash. This vulnerability specifically impacts elFinder installations configured to utilize the MySQL volume driver, while those employing the default <code>LocalFileSystem</code> driver remain unaffected. The vulnerability exists due to the system&rsquo;s failure to validate decoded file hashes as valid MySQL object identifiers before their inclusion in queries.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to elFinder with a valid user account.</li>
<li>Attacker identifies the elFinder instance is using the MySQL volume driver.</li>
<li>Attacker crafts a malicious <code>target</code> parameter containing a SQL injection payload encoded as a file hash.</li>
<li>Attacker sends a request to elFinder with the crafted <code>target</code> parameter, triggering one of the vulnerable functions: <code>cacheDir()</code>, <code>_joinPath()</code>, <code>_stat()</code>, or <code>_fopen()</code>.</li>
<li>elFinder decodes the file hash without proper validation.</li>
<li>The decoded SQL injection payload is incorporated into a MySQL query.</li>
<li>The injected SQL command executes against the MySQL database, potentially extracting sensitive data or causing a denial of service.</li>
<li>Attacker retrieves the leaked data or observes the degraded performance due to the denial-of-service condition.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows an authenticated user, even one with read-only access, to disclose data accessible to the configured MySQL account, including file contents stored by the driver and database metadata. It can also trigger denial of service through expensive or broad query results. The severity depends on the MySQL account privileges. Affected packages include <code>composer/studio-42/elfinder</code> versions 2.1.67 and earlier.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade <code>composer/studio-42/elfinder</code> to a version later than 2.1.67 to patch CVE-2026-44521.</li>
<li>Deploy the Sigma rule &ldquo;Detect elFinder SQL Injection Attempt via Target Parameter&rdquo; to identify exploitation attempts by monitoring requests with potentially malicious file hashes in the <code>target</code> parameter.</li>
<li>Consider using the default <code>LocalFileSystem</code> driver if the <code>MySQL</code> volume driver is not a requirement to mitigate CVE-2026-44521.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>elfinder</category></item></channel></rss>