Packagist (Composer) package
studio-42/elfinder
pkg:composer/studio-42/elfinder
Vulnerabilities (15)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2026-44521 | hig | — | < 2.1.68 | 2.1.68 | May 11, 2026 | ## Summary An authenticated SQL injection vulnerability in the elFinder MySQL volume driver (`elFinderVolumeMySQL`) allows any logged-in user, including users with read-only access to the affected volume, to inject SQL through a crafted `target` file hash. Successful exploitatio | |
| CVE-2026-41247 | Cri | 9.8 | < 2.1.67 | 2.1.67 | Apr 23, 2026 | elFinder is an open-source file manager for web, written in JavaScript using jQuery UI. Prior to 2.1.67, elFinder contains a command injection vulnerability in the resize command. The bg (background color) parameter is accepted from user input and passed through image resize/rota | |
| CVE-2024-38909 | — | <= 2.1.64 | — | Jul 30, 2024 | Studio 42 elFinder 2.1.64 is vulnerable to Incorrect Access Control. Copying files with an unauthorized extension between server directories allows an arbitrary attacker to expose secrets, perform RCE, etc. | ||
| CVE-2023-35840 | — | < 2.1.62 | 2.1.62 | Jun 19, 2023 | _joinPath in elFinderVolumeLocalFileSystem.class.php in elFinder before 2.1.62 allows path traversal in the PHP LocalVolumeDriver connector. | ||
| CVE-2022-27115 | — | < 2.1.61 | 2.1.61 | Apr 11, 2022 | In Studio-42 elFinder 2.1.60, there is a vulnerability that causes remote code execution through file name bypass for file upload. | ||
| CVE-2021-43421 | — | >= 2.0.4, < 2.1.60 | 2.1.60 | Apr 7, 2022 | A File Upload vulnerability exists in Studio-42 elFinder 2.0.4 to 2.1.59 via connector.minimal.php, which allows a remote malicious user to upload arbitrary files and execute PHP code. | ||
| CVE-2022-26960 | — | < 2.1.61 | 2.1.61 | Mar 21, 2022 | connector.minimal.php in std42 elFinder through 2.1.60 is affected by path traversal. This allows unauthenticated remote attackers to read, write, and browse files outside the configured document root. This is due to improper handling of absolute file paths. | ||
| CVE-2021-45919 | — | <= 2.1.31 | — | Feb 8, 2022 | Studio 42 elFinder through 2.1.31 allows XSS via an SVG document. | ||
| CVE-2021-32682 | — | < 2.1.59 | 2.1.59 | Jun 14, 2021 | elFinder is an open-source file manager for web, written in JavaScript using jQuery UI. Several vulnerabilities affect elFinder 2.1.58. These vulnerabilities can allow an attacker to execute arbitrary code and commands on the server hosting the elFinder PHP connector, even with m | ||
| CVE-2021-23394 | — | < 2.1.58 | 2.1.58 | Jun 13, 2021 | The package studio-42/elfinder before 2.1.58 are vulnerable to Remote Code Execution (RCE) via execution of PHP code in a .phar file. NOTE: This only applies if the server parses .phar files as PHP. | ||
| CVE-2019-9194 | — | < 2.1.48 | 2.1.48 | Feb 26, 2019 | elFinder before 2.1.48 has a command injection vulnerability in the PHP connector. | ||
| CVE-2019-6257 | — | < 2.1.49 | 2.1.49 | Jan 14, 2019 | A Server Side Request Forgery (SSRF) vulnerability in elFinder before 2.1.46 could allow a malicious user to access the content of internal network resources. This occurs in get_remote_contents() in php/elFinder.class.php. | ||
| CVE-2019-5884 | — | < 2.1.45 | 2.1.45 | Jan 10, 2019 | php/elFinder.class.php in elFinder before 2.1.45 leaks information if PHP's curl extension is enabled and safe_mode or open_basedir is not set. | ||
| CVE-2018-9110 | — | >= 2.1.12, < 2.1.37 | 2.1.37 | Mar 28, 2018 | Studio 42 elFinder before 2.1.37 has a directory traversal vulnerability in elFinder.class.php with the zipdl() function that can allow a remote attacker to download files accessible by the web server process and delete files owned by the account running the web server process. N | ||
| CVE-2018-9109 | — | < 2.1.36 | 2.1.36 | Mar 28, 2018 | Studio 42 elFinder before 2.1.36 has a directory traversal vulnerability in elFinder.class.php with the zipdl() function that can allow a remote attacker to download files accessible by the web server process and delete files owned by the account running the web server process. |
- affected < 2.1.68fixed 2.1.68
## Summary An authenticated SQL injection vulnerability in the elFinder MySQL volume driver (`elFinderVolumeMySQL`) allows any logged-in user, including users with read-only access to the affected volume, to inject SQL through a crafted `target` file hash. Successful exploitatio
- affected < 2.1.67fixed 2.1.67
elFinder is an open-source file manager for web, written in JavaScript using jQuery UI. Prior to 2.1.67, elFinder contains a command injection vulnerability in the resize command. The bg (background color) parameter is accepted from user input and passed through image resize/rota
- CVE-2024-38909Jul 30, 2024affected <= 2.1.64
Studio 42 elFinder 2.1.64 is vulnerable to Incorrect Access Control. Copying files with an unauthorized extension between server directories allows an arbitrary attacker to expose secrets, perform RCE, etc.
- CVE-2023-35840Jun 19, 2023affected < 2.1.62fixed 2.1.62
_joinPath in elFinderVolumeLocalFileSystem.class.php in elFinder before 2.1.62 allows path traversal in the PHP LocalVolumeDriver connector.
- CVE-2022-27115Apr 11, 2022affected < 2.1.61fixed 2.1.61
In Studio-42 elFinder 2.1.60, there is a vulnerability that causes remote code execution through file name bypass for file upload.
- CVE-2021-43421Apr 7, 2022affected >= 2.0.4, < 2.1.60fixed 2.1.60
A File Upload vulnerability exists in Studio-42 elFinder 2.0.4 to 2.1.59 via connector.minimal.php, which allows a remote malicious user to upload arbitrary files and execute PHP code.
- CVE-2022-26960Mar 21, 2022affected < 2.1.61fixed 2.1.61
connector.minimal.php in std42 elFinder through 2.1.60 is affected by path traversal. This allows unauthenticated remote attackers to read, write, and browse files outside the configured document root. This is due to improper handling of absolute file paths.
- CVE-2021-45919Feb 8, 2022affected <= 2.1.31
Studio 42 elFinder through 2.1.31 allows XSS via an SVG document.
- CVE-2021-32682Jun 14, 2021affected < 2.1.59fixed 2.1.59
elFinder is an open-source file manager for web, written in JavaScript using jQuery UI. Several vulnerabilities affect elFinder 2.1.58. These vulnerabilities can allow an attacker to execute arbitrary code and commands on the server hosting the elFinder PHP connector, even with m
- CVE-2021-23394Jun 13, 2021affected < 2.1.58fixed 2.1.58
The package studio-42/elfinder before 2.1.58 are vulnerable to Remote Code Execution (RCE) via execution of PHP code in a .phar file. NOTE: This only applies if the server parses .phar files as PHP.
- CVE-2019-9194Feb 26, 2019affected < 2.1.48fixed 2.1.48
elFinder before 2.1.48 has a command injection vulnerability in the PHP connector.
- CVE-2019-6257Jan 14, 2019affected < 2.1.49fixed 2.1.49
A Server Side Request Forgery (SSRF) vulnerability in elFinder before 2.1.46 could allow a malicious user to access the content of internal network resources. This occurs in get_remote_contents() in php/elFinder.class.php.
- CVE-2019-5884Jan 10, 2019affected < 2.1.45fixed 2.1.45
php/elFinder.class.php in elFinder before 2.1.45 leaks information if PHP's curl extension is enabled and safe_mode or open_basedir is not set.
- CVE-2018-9110Mar 28, 2018affected >= 2.1.12, < 2.1.37fixed 2.1.37
Studio 42 elFinder before 2.1.37 has a directory traversal vulnerability in elFinder.class.php with the zipdl() function that can allow a remote attacker to download files accessible by the web server process and delete files owned by the account running the web server process. N
- CVE-2018-9109Mar 28, 2018affected < 2.1.36fixed 2.1.36
Studio 42 elFinder before 2.1.36 has a directory traversal vulnerability in elFinder.class.php with the zipdl() function that can allow a remote attacker to download files accessible by the web server process and delete files owned by the account running the web server process.