๐Ÿ” CVE Alert

CVE-2026-41656

MEDIUM 4.5

Admidio: Path Traversal via Unvalidated `name` Parameter in Document Add Mode Enables Arbitrary Server File Read

CVSS Score
4.5
EPSS Score
0.0%
EPSS Percentile
0th

Admidio is an open-source user management solution. Prior to version 5.0.9, the add mode in modules/documents-files.php accepts a name parameter validated only as 'string' type (HTML encoding), allowing path traversal characters (../) to pass through unfiltered. Combined with the absence of CSRF protection on this endpoint and SameSite=Lax session cookies, a low-privileged attacker can trick a documents administrator into clicking a crafted link that registers an arbitrary server file (e.g., install/config.php containing database credentials) into a documents folder accessible to the attacker. This issue has been patched in version 5.0.9.

CWE CWE-22
Vendor admidio
Product admidio
Published May 7, 2026
Stay Ahead of the Next One

Get instant alerts for admidio admidio

Be the first to know when new medium vulnerabilities affecting admidio admidio are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None

Affected Versions

Admidio / admidio
< 5.0.9

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/Admidio/admidio/security/advisories/GHSA-m9h6-8pqm-xrhf github.com: https://github.com/Admidio/admidio/releases/tag/v5.0.9