CVE-2026-41655
Admidio: Path Traversal in ECard Preview Allows Reading Arbitrary Server Files Including Database Credentials
CVSS Score
6.5
EPSS Score
0.0%
EPSS Percentile
0th
Admidio is an open-source user management solution. Prior to version 5.0.9, the ecard_preview.php endpoint does not validate that the ecard_template POST parameter is a safe filename before passing it to ECard::getEcardTemplate(). An authenticated user can supply a path traversal payload (e.g., ../config.php) to read arbitrary files accessible to the web server process, including adm_my_files/config.php which contains database credentials. This issue has been patched in version 5.0.9.
| CWE | CWE-22 |
| Vendor | admidio |
| Product | admidio |
| Published | May 7, 2026 |
Stay Ahead of the Next One
Get instant alerts for admidio admidio
Be the first to know when new medium vulnerabilities affecting admidio admidio are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Affected Versions
Admidio / admidio
< 5.0.9