VYPR
High severityNVD Advisory· Published May 11, 2026· Updated May 11, 2026

elFinder MySQL has a SQL Injection in its Volume Driver (elFinderVolumeMySQL)

CVE-2026-44521

Description

Summary

An authenticated SQL injection vulnerability in the elFinder MySQL volume driver (elFinderVolumeMySQL) allows any logged-in user, including users with read-only access to the affected volume, to inject SQL through a crafted target file hash. Successful exploitation can lead to unauthorized data disclosure and denial of service.

This vulnerability only affects installations configured to use the MySQL volume driver. Installations using the default LocalFileSystem driver are not affected.

Description

A vulnerability in elFinder's MySQL volume driver (elFinderVolumeMySQL) allows authenticated SQL injection through a crafted file hash passed via the target parameter.

The issue is caused by two behaviors working together: 1. File hashes are decoded without validating that the decoded value is a valid MySQL object identifier. 2. The decoded value is then used in MySQL driver queries, including cacheDir(), _joinPath(), _stat(), and _fopen().

Because the MySQL storage schema uses numeric id and parent_id values, an authenticated user can supply a crafted hash that alters the intended SQL query logic. Successful exploitation can lead to unauthorized data disclosure and denial of service. The extent of impact depends on the privileges granted to the configured MySQL account.

This vulnerability only affects installations configured to use the MySQL volume driver. Installations using the default LocalFileSystem driver are not affected.

Impact

An authenticated user, including a user with read-only access to the affected volume, can exploit this issue to: - disclose data accessible to the configured MySQL account, including file contents stored by the driver and database metadata - trigger denial of service through expensive or unexpectedly broad query results that can lead to excessive memory consumption

The severity of data exposure depends on the privileges granted to the configured MySQL account.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Authenticated SQL injection in elFinder's MySQL volume driver allows data disclosure and denial of service via crafted file hash.

The vulnerability lies in elFinder's elFinderVolumeMySQL driver, where file hashes are decoded without validating that the decoded value is a valid MySQL object identifier. This decoded value is then used in SQL queries in functions such as cacheDir(), _joinPath(), _stat(), and _fopen(), leading to SQL injection [1][2].

An attacker can exploit this by supplying a crafted target parameter with a malicious file hash. The vulnerability is exploitable by any authenticated user, including those with read-only access to the affected volume. No special privileges beyond authentication are required [2].

Successful exploitation can lead to unauthorized disclosure of data accessible to the configured MySQL account, including file contents and database metadata. Additionally, an attacker can trigger denial of service by crafting queries that result in excessive memory consumption [2].

The impact is limited to installations using the MySQL volume driver; those using the default LocalFileSystem driver are unaffected. As of the advisory, no official patch has been released; users are advised to switch to the LocalFileSystem driver or apply mitigations as recommended by the vendor [1][2].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
studio-42/elfinderPackagist
< 2.1.682.1.68

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.