Vulnerability Details CVE-2026-41247
elFinder is an open-source file manager for web, written in JavaScript using jQuery UI. Prior to 2.1.67, elFinder contains a command injection vulnerability in the resize command. The bg (background color) parameter is accepted from user input and passed through image resize/rotate processing. In configurations that use the ImageMagick CLI backend, this value is incorporated into shell command strings without sufficient escaping. An attacker able to invoke the resize command with a crafted bg value may achieve arbitrary command execution as the web server process user. This vulnerability is fixed in 2.1.67.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.004
EPSS Ranking 63.0%
CVSS Severity
CVSS v3 Score 9.8
Products affected by CVE-2026-41247
-
cpe:2.3:a:std42:elfinder:1.0.1
-
cpe:2.3:a:std42:elfinder:1.1
-
cpe:2.3:a:std42:elfinder:1.2
-
cpe:2.3:a:std42:elfinder:2.0
-
cpe:2.3:a:std42:elfinder:2.0.3
-
cpe:2.3:a:std42:elfinder:2.0.4
-
cpe:2.3:a:std42:elfinder:2.0.5
-
cpe:2.3:a:std42:elfinder:2.0.6
-
cpe:2.3:a:std42:elfinder:2.0.7
-
cpe:2.3:a:std42:elfinder:2.0.8
-
cpe:2.3:a:std42:elfinder:2.0.9
-
cpe:2.3:a:std42:elfinder:2.1.0
-
cpe:2.3:a:std42:elfinder:2.1.1
-
cpe:2.3:a:std42:elfinder:2.1.10
-
cpe:2.3:a:std42:elfinder:2.1.11
-
cpe:2.3:a:std42:elfinder:2.1.12
-
cpe:2.3:a:std42:elfinder:2.1.13
-
cpe:2.3:a:std42:elfinder:2.1.14
-
cpe:2.3:a:std42:elfinder:2.1.15
-
cpe:2.3:a:std42:elfinder:2.1.16
-
cpe:2.3:a:std42:elfinder:2.1.17
-
cpe:2.3:a:std42:elfinder:2.1.18
-
cpe:2.3:a:std42:elfinder:2.1.19
-
cpe:2.3:a:std42:elfinder:2.1.2
-
cpe:2.3:a:std42:elfinder:2.1.20
-
cpe:2.3:a:std42:elfinder:2.1.21
-
cpe:2.3:a:std42:elfinder:2.1.22
-
cpe:2.3:a:std42:elfinder:2.1.23
-
cpe:2.3:a:std42:elfinder:2.1.24
-
cpe:2.3:a:std42:elfinder:2.1.25
-
cpe:2.3:a:std42:elfinder:2.1.26
-
cpe:2.3:a:std42:elfinder:2.1.27
-
cpe:2.3:a:std42:elfinder:2.1.28
-
cpe:2.3:a:std42:elfinder:2.1.29
-
cpe:2.3:a:std42:elfinder:2.1.3
-
cpe:2.3:a:std42:elfinder:2.1.30
-
cpe:2.3:a:std42:elfinder:2.1.31
-
cpe:2.3:a:std42:elfinder:2.1.32
-
cpe:2.3:a:std42:elfinder:2.1.33
-
cpe:2.3:a:std42:elfinder:2.1.34
-
cpe:2.3:a:std42:elfinder:2.1.35
-
cpe:2.3:a:std42:elfinder:2.1.36
-
cpe:2.3:a:std42:elfinder:2.1.37
-
cpe:2.3:a:std42:elfinder:2.1.38
-
cpe:2.3:a:std42:elfinder:2.1.39
-
cpe:2.3:a:std42:elfinder:2.1.4
-
cpe:2.3:a:std42:elfinder:2.1.40
-
cpe:2.3:a:std42:elfinder:2.1.41
-
cpe:2.3:a:std42:elfinder:2.1.42
-
cpe:2.3:a:std42:elfinder:2.1.43
-
cpe:2.3:a:std42:elfinder:2.1.44
-
cpe:2.3:a:std42:elfinder:2.1.45
-
cpe:2.3:a:std42:elfinder:2.1.46
-
cpe:2.3:a:std42:elfinder:2.1.47
-
cpe:2.3:a:std42:elfinder:2.1.48
-
cpe:2.3:a:std42:elfinder:2.1.49
-
cpe:2.3:a:std42:elfinder:2.1.5
-
cpe:2.3:a:std42:elfinder:2.1.50
-
cpe:2.3:a:std42:elfinder:2.1.51
-
cpe:2.3:a:std42:elfinder:2.1.52
-
cpe:2.3:a:std42:elfinder:2.1.53
-
cpe:2.3:a:std42:elfinder:2.1.54
-
cpe:2.3:a:std42:elfinder:2.1.55
-
cpe:2.3:a:std42:elfinder:2.1.56
-
cpe:2.3:a:std42:elfinder:2.1.57
-
cpe:2.3:a:std42:elfinder:2.1.58
-
cpe:2.3:a:std42:elfinder:2.1.59
-
cpe:2.3:a:std42:elfinder:2.1.6
-
cpe:2.3:a:std42:elfinder:2.1.60
-
cpe:2.3:a:std42:elfinder:2.1.7
-
cpe:2.3:a:std42:elfinder:2.1.8
-
cpe:2.3:a:std42:elfinder:2.1.9