Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 01 Apr 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
ssvc
|
Wed, 01 Apr 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | XenForo before 2.3.9 and before 2.2.18 allows remote code execution (RCE) by authenticated, but malicious, admin users. An attacker with admin panel access can execute arbitrary code on the server. | |
| Title | XenForo Remote Code Execution via Authenticated Admin | |
| First Time appeared |
Xenforo
Xenforo xenforo |
|
| Weaknesses | CWE-94 | |
| CPEs | cpe:2.3:a:xenforo:xenforo:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Xenforo
Xenforo xenforo |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-01T19:04:59.806Z
Reserved: 2026-04-01T00:19:59.194Z
Link: CVE-2026-35056
Updated: 2026-04-01T19:04:55.530Z
Status : Analyzed
Published: 2026-04-01T01:16:41.593
Modified: 2026-04-01T18:55:19.097
Link: CVE-2026-35056
No data.
OpenCVE Enrichment
Updated: 2026-04-02T20:18:40Z