VYPR
High severityNVD Advisory· Published Mar 6, 2026· Updated Mar 6, 2026

Idno: Remote Code Execution via Chained Import File Write and Template Path Traversal

CVE-2026-28507

Description

Idno is a social publishing platform. Prior to version 1.6.4, there is a remote code execution vulnerability via chained import file write and template path traversal. This issue has been patched in version 1.6.4.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Idno prior to 1.6.4 allows RCE by chaining an admin-level arbitrary file write via WordPress import with an authenticated template path traversal.

CVE-2026-28507 is a remote code execution vulnerability that affects Idno, a social publishing platform, prior to version 1.6.4. The issue is a chain of two distinct flaws: an arbitrary PHP file write achieved through a server-side request forgery (SSRF) during WordPress import, and a template path traversal that allows including that file. The advisory from the maintainers describes the full chain [1].

Exploitation

Exploitation requires at least two privileges: a web application admin account to trigger the file write, and any authenticated user (possibly the same admin) to trigger the template inclusion. The admin imports a crafted WordPress eXtended RSS (WXR) XML file, which causes the server to fetch attacker-controlled image URLs. The importImagesFromBodyHTML() function constructs the saved filename using basename() applied to the raw URL, enabling the attacker to place a file ending in .tpl.php into the server's uploads directory [1]. After the file is written, any authenticated user can craft a request with an unsanitized template name parameter that traverses paths to include the attacker-controlled file, leading to arbitrary code execution [1].

Impact

An attacker who successfully chains these vulnerabilities can execute arbitrary operating system commands as the web server user. The CVSS v4 score is 8.6 (High) with a vector of AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N, reflecting the need for admin privileges for the write step and the full compromise of confidentiality, integrity, and availability [1].

Mitigation

The vulnerability is patched in Idno version 1.6.4, which includes security fixes for both the image import and template validation issues [1][4]. Users should upgrade to 1.6.4 immediately. No other workarounds are documented.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
idno/knownPackagist
< 1.6.41.6.4

Affected products

2
  • Idnow/Idnowllm-fuzzy
    Range: <1.6.4
  • idno/idnov5
    Range: < 1.6.4

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.