Home

Description

Gibbon versions before v30.0.01 are affected by a path traversal vulnerability resulting in DOS by attempting extraction of web application PHP files, failed .zip extraction results in deletion of the file and a DOS condition. Successful exploitation requires Teacher or higher privileges. Exploitation could result in loss of availability of the web application.

PUBLISHED Reserved 2026-05-09 | Published 2026-05-09 | Updated 2026-05-09 | Assigner PRJBLK




MEDIUM: 6.9CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H

Problem types

CWE-23 Relative path traversal

Product status

Default status
unaffected

Any version before 30.0.01
affected

References

github.com/GibbonEdu/core/releases/tag/v30.0.01 vendor-advisory

projectblack.io/...-v30-authenticated-sql-injection-and-rce/ exploit

cve.org (CVE-2026-8209)

nvd.nist.gov (CVE-2026-8209)

Download JSON