Ad

CVE-2026-32985

CRITICAL CVSS 4.0: 9.3 EPSS 0.37%
Updated Mar 20, 2026
PHP
Parameter Value
CVSS 9.3 (CRITICAL)
Type CWE-434 (Unrestricted File Upload), CWE-306 (Missing Authentication for Critical Function)
Vendor PHP
Public PoC Yes

Xerte Online Toolkits versions 3.14 and earlier contain an unauthenticated arbitrary file upload vulnerability in the template import functionality that allows remote attackers to execute arbitrary code by uploading a crafted ZIP archive containing malicious PHP payloads. Attackers can bypass authentication checks in the import.php file to upload a template archive with PHP code in the media directory, which gets extracted to a web-accessible path where the malicious PHP can be directly accessed and executed under the web server context.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Attack Requirements
None
No additional conditions
Privileges Required
None
No privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
High
Complete data modification
Availability
High
Complete denial of service

CVSS Vector v4.0