Plattform
php
Komponente
xenforo
Behoben in
2.3.9
2.2.18
CVE-2026-35056 is a Remote Code Execution (RCE) vulnerability affecting XenForo. This vulnerability allows an authenticated, but malicious, admin user to execute arbitrary code on the server, potentially leading to complete system compromise. This affects XenForo versions 2.3.0 through 2.3.9. The vulnerability is fixed in version 2.3.9.
The impact of this vulnerability is significant, as it allows an attacker with administrative access to execute arbitrary code on the server hosting the XenForo forum. This could lead to complete system takeover, data exfiltration, modification of forum content, or the deployment of further malicious payloads. An attacker could potentially gain access to sensitive user data, including usernames, passwords, and private messages. The blast radius extends to any data stored on the server and any services accessible from the server.
CVE-2026-35056 was publicly disclosed on April 1, 2026. No public proof-of-concept (PoC) code has been released as of this writing. The vulnerability is not currently listed on CISA KEV. Given the RCE nature and the requirement for admin access, exploitation is likely to be targeted and require a degree of sophistication.
Exploit-Status
EPSS
0.43% (62% Perzentil)
CISA SSVC
The primary mitigation for CVE-2026-35056 is to immediately upgrade XenForo to version 2.3.9 or later. If upgrading is not immediately feasible, restrict administrative access to only trusted users and implement strict monitoring of admin panel activity. Consider implementing a Web Application Firewall (WAF) with rules to detect and block suspicious code execution attempts. Regularly review XenForo’s security recommendations and apply any relevant configuration changes.
Aktualisieren Sie XenForo auf Version 2.3.9 oder 2.2.18 oder eine spätere Version. Dies behebt die Remote Code Execution-Schwachstelle für authentifizierte Administratorbenutzer.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
Versions prior to 2.3.9 and 2.2.18 are vulnerable to this vulnerability.
Check the XenForo version in the admin panel, under the 'Forum Information' section.
If you can't update immediately, consider limiting administrative access and monitoring server logs.
There isn't a specific tool, but you can look for recently modified files or unusual activity in server logs.
The vulnerability was discovered and reported by the XenForo developers.
CVSS-Vektor
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.