Cyber Posture

CVE-2026-34607

HighPublic PoC

Published: 03 April 2026

Published
03 April 2026
Modified
13 April 2026
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0044 63.1th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-34607 is a high-severity Path Traversal (CWE-22) vulnerability in Emlog Emlog. Its CVSS base score is 7.2 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 36.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 requires validation of ZIP archive entry names to block path traversal sequences like ../ during extraction, directly preventing arbitrary file writes.

prevent

SI-2 mandates identification, reporting, and correction of the path traversal flaw in emUnZip(), eliminating the vulnerability at its source.

detect

SI-7 monitors filesystem integrity to detect unauthorized file modifications resulting from exploited ZIP extractions leading to webshell deployment.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1100 Web Shell Persistence
A Web shell is a Web script that is placed on an openly accessible Web server to allow an adversary to use the Web server as a gateway into a network.
Why these techniques?

Path traversal in public-facing web app (Emlog) allows crafted ZIP upload to write PHP webshell for RCE.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Emlog is an open source website building system. In versions 2.6.2 and prior, a path traversal vulnerability exists in the emUnZip() function (include/lib/common.php:793). When extracting ZIP archives (plugin/template uploads, backup imports), the function calls $zip->extractTo($path) without sanitizing ZIP entry names.…

more

An authenticated admin can upload a crafted ZIP containing entries with ../ sequences to write arbitrary files to the server filesystem, including PHP webshells, achieving Remote Code Execution (RCE). At time of publication, there are no publicly available patches.

Deeper analysisAI

CVE-2026-34607 is a path traversal vulnerability in Emlog, an open source website building system, affecting versions 2.6.2 and prior. The flaw exists in the emUnZip() function at include/lib/common.php:793, which extracts ZIP archives during plugin/template uploads and backup imports by calling $zip->extractTo($path) without sanitizing ZIP entry names.

An authenticated administrator can exploit the vulnerability by uploading a crafted ZIP archive containing entries with ../ sequences. This enables writing arbitrary files to the server filesystem, including PHP webshells, ultimately achieving remote code execution (RCE).

The GitHub security advisory (GHSA-2jg8-rmhm-xv9m) indicates that no publicly available patches exist at the time of publication on 2026-04-03.

Details

CWE(s)

Affected Products

emlog
emlog
≤ 2.6.2

CVEs Like This One

CVE-2026-21433Same product: Emlog Emlog
CVE-2025-30372Same product: Emlog Emlog
CVE-2025-25783Same product: Emlog Emlog
CVE-2026-22799Same product: Emlog Emlog
CVE-2026-21430Same product: Emlog Emlog
CVE-2025-29401Same product: Emlog Emlog
CVE-2025-9296Same product: Emlog Emlog
CVE-2025-25823Same product: Emlog Emlog
CVE-2026-31954Same product: Emlog Emlog
CVE-2025-61318Same product: Emlog Emlog

References