Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-m3vp-3jjm-gpmx | Admidio has Path Traversal in ECard Preview that Allows Reading Arbitrary Server Files Including Database Credentials |
Thu, 07 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 07 May 2026 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Admidio
Admidio admidio |
|
| Vendors & Products |
Admidio
Admidio admidio |
Thu, 07 May 2026 04:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Admidio is an open-source user management solution. Prior to version 5.0.9, the ecard_preview.php endpoint does not validate that the ecard_template POST parameter is a safe filename before passing it to ECard::getEcardTemplate(). An authenticated user can supply a path traversal payload (e.g., ../config.php) to read arbitrary files accessible to the web server process, including adm_my_files/config.php which contains database credentials. This issue has been patched in version 5.0.9. | |
| Title | Admidio: Path Traversal in ECard Preview Allows Reading Arbitrary Server Files Including Database Credentials | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-07T14:58:46.833Z
Reserved: 2026-04-21T23:58:43.803Z
Link: CVE-2026-41655
Updated: 2026-05-07T13:54:54.760Z
Status : Deferred
Published: 2026-05-07T04:16:28.470
Modified: 2026-05-07T16:16:20.177
Link: CVE-2026-41655
No data.
OpenCVE Enrichment
Updated: 2026-05-07T06:00:15Z
Github GHSA