Home

Description

Xerte Online Toolkits versions 3.15 and earlier contain an information disclosure vulnerability that allows unauthenticated attackers to retrieve the full server-side filesystem path of the application root. Attackers can send a GET request to the /setup page to access the exposed root_path value rendered in the HTML response, which enables exploitation of path-dependent vulnerabilities such as relative path traversal in connector.php.

PUBLISHED Reserved 2026-04-20 | Published 2026-04-22 | Updated 2026-04-24 | Assigner VulnCheck




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Problem types

CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere

Product status

Default status
unaffected

3.15.0 (semver)
affected

Any version before f063e942b4a9bf77a06829e844c2c70316bc45e8
affected

Credits

bootstrapbool finder

References

github.com/bootstrapbool/xerteonlinetoolkits-rce technical-description exploit

xerte.org.uk/xertetoolkits_3.15_ChangeLog.html release-notes

xerte.org.uk/...downloads-1/category/3-xerte-online-toolkits product permissions-required

github.com/thexerteproject/xerteonlinetoolkits/issues/1527 issue-tracking

github.com/...ommit/f063e942b4a9bf77a06829e844c2c70316bc45e8 patch

www.vulncheck.com/...line-toolkits-path-disclosure-via-setup third-party-advisory

cve.org (CVE-2026-41459)

nvd.nist.gov (CVE-2026-41459)

Download JSON