VYPR
Medium severity5.4NVD Advisory· Published Apr 27, 2026· Updated Apr 27, 2026

CVE-2026-41467

CVE-2026-41467

Description

ProjeQtor versions 7.0 through 12.4.3 contain a stored cross-site scripting vulnerability in the file upload functionality where the checkValidFileName() function fails to restrict HTML and HTM file uploads. Authenticated attackers can upload HTML files containing arbitrary JavaScript through the image upload or attachment endpoints, and any user accessing the uploaded file URL will execute the embedded JavaScript in their browser.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

ProjeQtor 7.0-12.4.3 stored XSS: checkValidFileName() allows HTML file uploads, enabling authenticated attackers to execute arbitrary JavaScript when victims access the file.

Root

Cause

The stored cross-site scripting vulnerability in ProjeQtor arises from insufficient validation in the checkValidFileName() function within Security.php. This function only blocks .php and .htaccess file extensions but permits .html and .htm files, and it does not inspect file content for malicious scripts [2][3]. As a result, an authenticated attacker can upload an HTML file containing arbitrary JavaScript through endpoints such as /tool/uploadImage.php or /tool/saveAttachment.php.

Attack

Vector

Exploitation requires low-privilege authentication and user interaction. The attacker uploads a crafted HTML file; any user who accesses the uploaded file's URL will execute the embedded JavaScript in their browser context [2]. The attack is remote, with no special network position required.

Impact

Successful exploitation allows the attacker to perform actions in the victim's session, including session hijacking, data theft, and defacement. The scope is changed because the script executes in the victim's browser, not the application's origin [2][3].

Mitigation

The vulnerability is fixed in ProjeQtor version 12.4.4 [3]. Users running versions 7.0 through 12.4.3 should upgrade immediately. No official workaround is documented; restricting file uploads to trusted users may reduce risk but does not eliminate it.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.