๐Ÿ” CVE Alert

CVE-2026-32985

CRITICAL 9.8

Xerte Online Toolkits <= 3.14 Unauthenticated Template Import Arbitrary File Upload Leading to Remote Code Execution

CVSS Score
9.8
EPSS Score
0.4%
EPSS Percentile
58th

Xerte Online Toolkits versions 3.14 and earlier contain an unauthenticated arbitrary file upload vulnerability in the template import functionality that allows remote attackers to execute arbitrary code by uploading a crafted ZIP archive containing malicious PHP payloads. Attackers can bypass authentication checks in the import.php file to upload a template archive with PHP code in the media directory, which gets extracted to a web-accessible path where the malicious PHP can be directly accessed and executed under the web server context.

CWE CWE-306 CWE-434
Vendor xerte
Product xerte online toolkits
Published Mar 20, 2026
Last Updated Mar 20, 2026
Stay Ahead of the Next One

Get instant alerts for xerte xerte online toolkits

Be the first to know when new critical vulnerabilities affecting xerte xerte online toolkits are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

Xerte / Xerte Online Toolkits
0 โ‰ค 3.14

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
xot.xerte.org.uk: https://xot.xerte.org.uk/ packetstorm.news: https://packetstorm.news/files/id/216288/

Credits

indoushka