CVE-2026-44666
Description
HRConvert2 is a self-hosted, drag-and-drop & nosql file conversion server & share tool. Prior to 3.3.8, the sanitizeString() function in convertCore.php is missing backtick (`) and tab (\t) from its strip list. User input then reaches shell_exec(), where the shell interprets these characters and commands within filenames execute. This vulnerability is fixed in 3.3.8.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Unauthenticated remote command execution in HRConvert2 prior to 3.3.8 due to missing sanitization of backtick and tab characters in convertCore.php.
Root
Cause
The sanitizeString() function in convertCore.php fails to strip backtick (` `) and tab (\t) characters from user input, allowing them to pass into shell_exec()` calls [1]. This missing sanitization enables an attacker to inject shell metacharacters that the shell interprets, leading to arbitrary command execution.
Exploitation
Two attack vectors are identified [1]:
- Backtick Injection: Uploading a file with a filename containing backticks (e.g., `
xid.png) causes the shell to execute the enclosed command (here,id) before theconvert` command runs.
- Tab Injection: Providing an extension containing a tab character (e.g.,
jpg<TAB>shell.php) results inshell_exec()writing output to both the intended file and an additional file. If the uploaded PNG contains PHP code in metadata, the resultingshell.phpcan be accessed and executed via the web server.
Both vectors require no authentication and can be exploited by uploading a crafted file and triggering conversion.
Impact
Successful exploitation allows a remote, unauthenticated attacker to execute arbitrary commands as the www-data user, potentially leading to complete server compromise [2]. The attack can be used to drop webshells, exfiltrate data, or pivot to internal networks.
Mitigation
The vulnerability is fixed in HRConvert2 version 3.3.8 [2]. All users running versions prior to 3.3.8 are strongly advised to upgrade immediately. No workarounds are available.
AI Insight generated by deepseek/deepseek-v4-flash-20260423 on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2(expand)+ 1 more
- (no CPE)
- (no CPE)range: <3.3.8
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.