Home

Description

ProcessMaker 3.5.4 contains a local file inclusion vulnerability that allows unauthenticated attackers to read arbitrary files by exploiting improper path traversal validation. Attackers can send requests with directory traversal sequences to access sensitive system files like /etc/passwd without authentication.

PUBLISHED Reserved 2026-05-16 | Published 2026-05-16 | Updated 2026-05-16 | Assigner VulnCheck




MEDIUM: 6.9CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
MEDIUM: 6.2CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')

Product status

Any version
affected

Credits

Ai Ho (@j3ssiejjj) finder

References

www.exploit-db.com/exploits/50229 (ExploitDB-50229) exploit

www.processmaker.com/ (Official Product Homepage) product

www.vulncheck.com/...local-file-inclusion-via-path-traversal (VulnCheck Advisory: ProcessMaker 3.5.4 Local File Inclusion via Path Traversal) third-party-advisory

cve.org (CVE-2021-47978)

nvd.nist.gov (CVE-2021-47978)

Download JSON