Home

Description

A security vulnerability has been detected in Textpattern up to 4.9.1. Affected by this vulnerability is the function mt_uploadImage of the file rpc/TXP_RPCServer.php of the component XML-RPC Handler. The manipulation of the argument file.name leads to path traversal. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. The vendor confirmed the issue and will provide a fix in the upcoming release.

PUBLISHED Reserved 2026-04-01 | Published 2026-04-02 | Updated 2026-04-02 | Assigner VulDB




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
MEDIUM: 6.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:C
MEDIUM: 6.3CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:C
6.5AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:C

Problem types

Path Traversal

Timeline

2026-04-01:Advisory disclosed
2026-04-01:VulDB entry created
2026-04-01:VulDB entry last update

Credits

zsmaaa (VulDB User) reporter

VulDB CNA Team coordinator

References

vuldb.com/vuln/354696 (VDB-354696 | Textpattern XML-RPC TXP_RPCServer.php mt_uploadImage path traversal) vdb-entry technical-description

vuldb.com/vuln/354696/cti (VDB-354696 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/submit/769166 (Submit #769166 | Textpattern 4.9.1 Textpattern XML-RPC Arbitrary File Write) third-party-advisory

github.com/LTX-GOD/Mycve/blob/main/Textpatterncms_en.md broken-link exploit

cve.org (CVE-2026-5344)

nvd.nist.gov (CVE-2026-5344)

Download JSON