Home

Description

ProjeQtor versions 7.0 through 12.4.3 contain a ZipSlip path traversal vulnerability in the plugin upload functionality that allows authenticated attackers with upload permissions to write files outside the intended extraction directory by crafting ZIP archives with directory traversal sequences. Attackers can exploit unvalidated archive extraction to write a PHP webshell to a web-accessible directory and achieve remote code execution with the privileges of the web server process.

PUBLISHED Reserved 2026-04-20 | Published 2026-04-27 | Updated 2026-04-27 | Assigner VulnCheck




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

Default status
unaffected

7.0 (semver)
affected

12.4.4 (semver)
unaffected

Credits

Yassine Damiri finder

Noé Susset finder

References

damiri.fr/en/cves/CVE-2026-41463 technical-description exploit

gryfman.fr/cves/CVE-2026-41463 technical-description exploit

www.projeqtor.com product

www.vulncheck.com/...lip-path-traversal-via-uploadplugin-php third-party-advisory

cve.org (CVE-2026-41463)

nvd.nist.gov (CVE-2026-41463)

Download JSON