<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Xerte — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/xerte/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 23 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/xerte/feed.xml" rel="self" type="application/rss+xml"/><item><title>Xerte Online Toolkits Unauthenticated Remote Code Execution via File Upload</title><link>https://feed.craftedsignal.io/briefs/2026-04-xerte-rce/</link><pubDate>Thu, 23 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-xerte-rce/</guid><description>Xerte Online Toolkits 3.15 and earlier contain an incomplete input validation vulnerability allowing unauthenticated attackers to upload malicious PHP code with a '.php4' extension, leading to arbitrary operating system command execution on the server.</description><content:encoded><![CDATA[<p>Xerte Online Toolkits, a platform used for creating online learning materials, is vulnerable to unauthenticated remote code execution (RCE). Specifically, versions 3.15 and earlier contain an incomplete input validation vulnerability within the elFinder connector endpoint. This flaw allows an attacker to bypass existing file extension filters and upload PHP files with a &lsquo;.php4&rsquo; extension. Combined with authentication bypass and path traversal vulnerabilities, this can lead to arbitrary operating system command execution on the underlying server. This vulnerability, identified as CVE-2026-34415, poses a significant risk to organizations using affected versions of Xerte Online Toolkits, potentially allowing attackers to gain complete control of the web server.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a crafted HTTP request to the elFinder connector endpoint.</li>
<li>The attacker exploits an authentication bypass vulnerability to gain unauthorized access to file upload functionality.</li>
<li>The attacker leverages a path traversal vulnerability to specify a writable directory for the uploaded file.</li>
<li>The attacker uploads a malicious PHP file disguised with a &lsquo;.php4&rsquo; extension, bypassing the incomplete input validation.</li>
<li>The server saves the malicious PHP file to the specified directory.</li>
<li>The attacker sends another HTTP request to directly access the uploaded PHP file via its URL.</li>
<li>The web server executes the PHP code within the uploaded file, granting the attacker arbitrary code execution.</li>
<li>The attacker can now execute operating system commands on the server, potentially leading to data theft, system compromise, or further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an unauthenticated attacker to execute arbitrary operating system commands on the affected Xerte Online Toolkits server. Given the high CVSS score of 9.8, this vulnerability is considered critical. If exploited, an attacker could potentially gain full control of the server, leading to data breaches, defacement of the website, or the use of the compromised server as a launchpad for further attacks within the network. The number of potentially affected installations is currently unknown.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Xerte Online Toolkits to a patched version greater than 3.15 to remediate CVE-2026-34415.</li>
<li>Implement the Sigma rule &ldquo;Detect Suspicious PHP4 Uploads&rdquo; to identify potential exploitation attempts by monitoring web server logs for &lsquo;.php4&rsquo; file uploads.</li>
<li>Review web server access logs for unusual requests to PHP files located in unexpected directories, which may indicate exploitation attempts.</li>
<li>Monitor web server logs for requests to the elFinder connector endpoint that include suspicious parameters or file extensions.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-34415</category><category>rce</category><category>file-upload</category><category>web-application</category></item><item><title>Xerte Online Toolkits Unauthenticated Remote Code Execution via elFinder Connector</title><link>https://feed.craftedsignal.io/briefs/2024-01-xerte-rce/</link><pubDate>Wed, 24 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-xerte-rce/</guid><description>Xerte Online Toolkits versions 3.15 and earlier are vulnerable to unauthenticated remote code execution due to a missing authentication check in the elFinder connector, allowing arbitrary file operations that can be chained with other vulnerabilities.</description><content:encoded><![CDATA[<p>Xerte Online Toolkits, a web-based open-source e-learning content creation platform, is vulnerable to a critical remote code execution vulnerability (CVE-2026-34413) affecting versions 3.15 and earlier. The vulnerability lies within the elFinder connector endpoint at <code>/editor/elfinder/php/connector.php</code>, which lacks proper authentication. This allows unauthenticated attackers to bypass intended access controls and directly interact with the file management system. Attackers can leverage this flaw to perform unauthorized file operations, including creating, uploading, renaming, duplicating, overwriting, and deleting files within project media directories. This can be chained with path traversal and extension blocklist bypass vulnerabilities to ultimately achieve remote code execution and arbitrary file read on the affected server.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a malicious HTTP request to <code>/editor/elfinder/php/connector.php</code> targeting the elFinder file manager.</li>
<li>Due to the missing authentication check, the server processes the request without validating the user&rsquo;s identity.</li>
<li>The attacker leverages the file operation functionalities (create, upload, rename, duplicate, overwrite, delete) of elFinder.</li>
<li>The attacker exploits a path traversal vulnerability to navigate outside the intended media directory.</li>
<li>The attacker uploads a malicious PHP file with a bypassed extension filter (e.g., using double extensions or null byte injection).</li>
<li>The attacker renames the uploaded file to a valid PHP extension (e.g., <code>.php</code>).</li>
<li>The attacker sends an HTTP request to the renamed PHP file, triggering server-side execution.</li>
<li>The attacker achieves remote code execution on the server, allowing for arbitrary system commands and data access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability grants unauthenticated attackers the ability to execute arbitrary code on the Xerte Online Toolkits server. This can lead to complete system compromise, data theft, defacement of the learning platform, and denial of service. The severity is high due to the ease of exploitation and the potential for widespread impact across educational institutions and organizations utilizing Xerte Online Toolkits for e-learning content delivery.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the latest security patches or upgrade to a version of Xerte Online Toolkits greater than 3.15 to address CVE-2026-34413.</li>
<li>Implement the Sigma rule <code>Detect Unauthenticated elFinder Connector Access</code> to identify unauthorized access attempts to the vulnerable endpoint.</li>
<li>Review and harden file upload policies to prevent the upload of potentially malicious file types, mitigating the risk of chained exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>CVE-2026-34413</category><category>xerte</category><category>rce</category></item><item><title>Xerte Online Toolkits Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-xerte-path-traversal/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-xerte-path-traversal/</guid><description>Xerte Online Toolkits 3.15 and earlier are vulnerable to relative path traversal, allowing attackers to move files and potentially achieve remote code execution.</description><content:encoded><![CDATA[<p>Xerte Online Toolkits, a tool used to create online learning materials, is vulnerable to a path traversal vulnerability (CVE-2026-34414) in versions 3.15 and earlier. The vulnerability exists in the elFinder connector endpoint at <code>/editor/elfinder/php/connector.php</code>. The <code>name</code> parameter within rename commands is not properly sanitized, allowing attackers to use directory traversal sequences (e.g., <code>../</code>) to manipulate file locations. This flaw can be exploited to overwrite application files, inject stored cross-site scripting (XSS), or, when combined with other vulnerabilities, achieve unauthenticated remote code execution (RCE). This poses a significant threat to organizations utilizing affected versions of Xerte Online Toolkits, potentially leading to data breaches, system compromise, and reputational damage.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable Xerte Online Toolkits instance running version 3.15 or earlier.</li>
<li>The attacker crafts a malicious HTTP request to <code>/editor/elfinder/php/connector.php</code> targeting the rename command.</li>
<li>Within the request, the <code>name</code> parameter contains directory traversal sequences (e.g., <code>../../</code>) and the desired destination path.</li>
<li>The server, due to insufficient input validation, processes the request without properly sanitizing the <code>name</code> parameter.</li>
<li>The attacker moves a file (e.g., an uploaded image or media file) from its original project media directory to a new location specified within the malicious <code>name</code> parameter. This could involve moving a file to the application root directory.</li>
<li>If the attacker moves a specifically crafted PHP file to the application root and the webserver is configured to execute PHP files in the root, the attacker can then access this file via a web request.</li>
<li>The attacker executes arbitrary code on the server.</li>
<li>The attacker gains complete control of the Xerte Online Toolkits instance and potentially the underlying server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to several critical consequences. Attackers can overwrite sensitive application files, leading to denial of service or system instability. The injection of malicious JavaScript code can result in stored cross-site scripting (XSS) attacks, compromising user accounts and data. The most severe outcome is unauthenticated remote code execution (RCE), enabling attackers to gain complete control over the affected server, potentially leading to data breaches, malware deployment, and further lateral movement within the network. The CVSS v3.1 base score for this vulnerability is 7.1, indicating a high level of risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Xerte Online Toolkits to a version greater than 3.15 to patch CVE-2026-34414.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Path Traversal in Xerte Connector</code> to identify attempted exploitation of the path traversal vulnerability by monitoring requests to <code>/editor/elfinder/php/connector.php</code> with directory traversal sequences.</li>
<li>Implement input validation and sanitization on the <code>name</code> parameter within the elFinder connector to prevent path traversal attacks.</li>
<li>Review web server configurations to prevent the execution of PHP files from the web root directory.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>path-traversal</category><category>remote-code-execution</category><category>xss</category></item></channel></rss>