Home

Description

Gibbon versions before v30.0.01 are affected by a local file inclusion vulnerability resulting in RCE by changing the report archive directory and forcing interpretation of a user provided .zip as PHP. Successful exploitation requires Teacher or higher privileges. Exploitation could result in compromise of the underlying web server.

PUBLISHED Reserved 2026-05-09 | Published 2026-05-09 | Updated 2026-05-09 | Assigner PRJBLK




HIGH: 8.9CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Problem types

CWE-98 Improper control of filename for Include/Require statement in PHP program ('PHP remote file inclusion')

Product status

Default status
affected

Any version before 30.0.01
affected

References

projectblack.io/...-v30-authenticated-sql-injection-and-rce/ exploit

github.com/GibbonEdu/core/releases/tag/v30.0.01 vendor-advisory

cve.org (CVE-2026-8208)

nvd.nist.gov (CVE-2026-8208)

Download JSON