CVE-2026-41459: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in thexerteproject xerteonlinetoolkits
Xerte Online Toolkits versions 3. 15 and earlier have an information disclosure vulnerability that allows unauthenticated attackers to retrieve the full server-side filesystem path of the application root by sending a GET request to the /setup page. This exposure of the root_path value in the HTML response can facilitate exploitation of other path-dependent vulnerabilities such as relative path traversal. The vulnerability has a CVSS 4. 0 base score of 6. 9, indicating medium severity. No official patch or remediation guidance is currently available from the vendor. There are no known exploits in the wild at this time.
AI Analysis
Technical Summary
CVE-2026-41459 is an information disclosure vulnerability in thexerteproject's xerteonlinetoolkits (version 3.15 and earlier) where unauthenticated attackers can access the full server-side filesystem path of the application root by requesting the /setup page. The disclosed root_path value is rendered in the HTML response, which may enable attackers to leverage path-dependent vulnerabilities such as relative path traversal in connector.php. The vulnerability is classified under CWE-497 (Exposure of Sensitive System Information to an Unauthorized Control Sphere) and has a CVSS 4.0 score of 6.9 (medium severity). No vendor advisory or patch is currently available, and the product is not a cloud service.
Potential Impact
The vulnerability allows unauthenticated attackers to obtain sensitive system information, specifically the full server-side filesystem path of the application root. This information disclosure can aid attackers in crafting further attacks that rely on knowledge of the filesystem structure, such as relative path traversal exploits. However, the vulnerability itself does not directly allow system compromise or data modification. There are no known active exploits in the wild.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Since no official patch or fix is currently available, users should monitor thexerteproject's official channels for updates. Until a fix is released, consider restricting access to the /setup page or implementing web application firewall rules to block unauthorized requests to this endpoint.
CVE-2026-41459: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in thexerteproject xerteonlinetoolkits
Description
Xerte Online Toolkits versions 3. 15 and earlier have an information disclosure vulnerability that allows unauthenticated attackers to retrieve the full server-side filesystem path of the application root by sending a GET request to the /setup page. This exposure of the root_path value in the HTML response can facilitate exploitation of other path-dependent vulnerabilities such as relative path traversal. The vulnerability has a CVSS 4. 0 base score of 6. 9, indicating medium severity. No official patch or remediation guidance is currently available from the vendor. There are no known exploits in the wild at this time.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-41459 is an information disclosure vulnerability in thexerteproject's xerteonlinetoolkits (version 3.15 and earlier) where unauthenticated attackers can access the full server-side filesystem path of the application root by requesting the /setup page. The disclosed root_path value is rendered in the HTML response, which may enable attackers to leverage path-dependent vulnerabilities such as relative path traversal in connector.php. The vulnerability is classified under CWE-497 (Exposure of Sensitive System Information to an Unauthorized Control Sphere) and has a CVSS 4.0 score of 6.9 (medium severity). No vendor advisory or patch is currently available, and the product is not a cloud service.
Potential Impact
The vulnerability allows unauthenticated attackers to obtain sensitive system information, specifically the full server-side filesystem path of the application root. This information disclosure can aid attackers in crafting further attacks that rely on knowledge of the filesystem structure, such as relative path traversal exploits. However, the vulnerability itself does not directly allow system compromise or data modification. There are no known active exploits in the wild.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Since no official patch or fix is currently available, users should monitor thexerteproject's official channels for updates. Until a fix is released, consider restricting access to the /setup page or implementing web application firewall rules to block unauthorized requests to this endpoint.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2026-04-20T16:07:47.310Z
- Cvss Version
- 4.0
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69e91af419fe3cd2cde2a8c7
Added to database: 4/22/2026, 7:01:08 PM
Last enriched: 4/22/2026, 7:16:33 PM
Last updated: 4/22/2026, 8:46:34 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.