CVE-2022-26960
PHP vulnerability analysis and mitigation

Overview

elFinder through version 2.1.60 is affected by a path traversal vulnerability (CVE-2022-26960) that was discovered in March 2022. This vulnerability allows unauthenticated remote attackers to read, write, and browse files outside the configured document root directory. The issue stems from improper handling of absolute file paths in the connector.minimal.php component (NVD, Synacktiv).

Technical details

The vulnerability exists in the getFullPath function within elFinderVolumeDriver.class.php, which fails to properly sanitize path traversal sequences. The function uses an incorrect regex pattern (#(/)/+/../#) for normalizing paths, which allows attackers to bypass directory traversal protections by using double slash sequences (//) followed by ../ patterns. The vulnerability received a CVSS v3.1 score of 9.1 CRITICAL (NVD, Synacktiv).

Impact

The vulnerability allows attackers to read, write, and browse files outside the configured document root directory. With appropriate permissions, attackers can perform various actions including searching, uploading files, and browsing parent directories. In some cases, this can lead to remote code execution by modifying critical files such as authorized_keys or crontabs (Synacktiv).

Mitigation and workarounds

The vulnerability was patched in elFinder version 2.1.61. Organizations should upgrade to this version or later to address the issue. The fix includes improved path validation in the _joinPath function and additional security measures for handling file paths (Synacktiv).

Additional resources


SourceThis report was generated using AI

Related PHP vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

GHSA-898v-775g-777cCRITICAL9.4
  • PHPPHP
  • neuron-core/neuron-ai
NoYesDec 09, 2025
GHSA-5j8p-438x-rgg5CRITICAL9.3
  • PHPPHP
  • onelogin/php-saml
NoYesDec 09, 2025
GHSA-j8g6-5gqc-mq36HIGH8.2
  • PHPPHP
  • neuron-core/neuron-ai
NoYesDec 09, 2025
GHSA-pvcv-q3q7-266gHIGH8.1
  • PHPPHP
  • filament/filament
NoYesDec 09, 2025
GHSA-6w82-v552-wjw2HIGH7.1
  • PHPPHP
  • shopware/shopware
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management