CVE-2021-23394
PHP vulnerability analysis and mitigation

Overview

The package studio-42/elfinder before version 2.1.58 is vulnerable to Remote Code Execution (RCE) via execution of PHP code in a .phar file. This vulnerability, tracked as CVE-2021-23394, was discovered in March 2021 and affects installations where the server parses .phar files as PHP (Sonar Blog, CVE Details).

Technical details

The vulnerability exists due to insufficient validation of file extensions and MIME types in the file upload functionality. While elFinder implements a blocklist for dangerous file types, it failed to include .phar files in this list. On Apache HTTP 2.4.46-1ubuntu1 and similar configurations, .phar files are treated as application/x-httpd-php and are executed as PHP code. This oversight allows attackers to bypass the security measures by uploading malicious PHP code within .phar files (Sonar Blog).

Impact

The successful exploitation of this vulnerability allows an attacker to execute arbitrary PHP code on the affected server, potentially leading to complete server compromise. The vulnerability is particularly severe as it can be exploited without authentication in the default configuration (Sonar Blog).

Mitigation and workarounds

The vulnerability was fixed in elFinder version 2.1.58 by adding 'phar:*' => 'text/x-php' to the staticMineMap configuration, preventing the upload of .phar files. Users are strongly recommended to upgrade to version 2.1.59 or later. Additionally, implementing strong access control on the connector (e.g., basic access authentication) is advised as an extra security measure (Sonar Blog).

Additional resources


SourceThis report was generated using AI

Related PHP vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

GHSA-898v-775g-777cCRITICAL9.4
  • PHPPHP
  • neuron-core/neuron-ai
NoYesDec 09, 2025
GHSA-5j8p-438x-rgg5CRITICAL9.3
  • PHPPHP
  • onelogin/php-saml
NoYesDec 09, 2025
GHSA-j8g6-5gqc-mq36HIGH8.2
  • PHPPHP
  • neuron-core/neuron-ai
NoYesDec 09, 2025
GHSA-pvcv-q3q7-266gHIGH8.1
  • PHPPHP
  • filament/filament
NoYesDec 09, 2025
GHSA-6w82-v552-wjw2HIGH7.1
  • PHPPHP
  • shopware/shopware
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management