Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 14 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Efwgrp
Efwgrp efw4.x |
|
| Vendors & Products |
Efwgrp
Efwgrp efw4.x |
Tue, 12 May 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | efw4.X is an Enterprise Framework for Web. Prior to 4.08.010, the elfinder_checkRisk function validates target and targets for path traversal and home containment, but does not validate the dst (destination) parameter used by elfinder_paste. An attacker can copy or move files from within the home directory to any arbitrary destination by setting dst to a base64-encoded traversal path. This bypasses the protected=true security control. This vulnerability is fixed in 4.08.010. | |
| Title | efw4.X: Path Traversal via Unchecked dst Parameter leads to Remote Code Execution | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-14T12:32:34.599Z
Reserved: 2026-05-05T16:33:55.844Z
Link: CVE-2026-44258
Updated: 2026-05-14T12:32:17.516Z
Status : Deferred
Published: 2026-05-12T22:16:36.127
Modified: 2026-05-14T13:16:19.357
Link: CVE-2026-44258
No data.
OpenCVE Enrichment
Updated: 2026-05-13T10:35:35Z