CVE-2026-35056
Published: 01 April 2026
Summary
CVE-2026-35056 is a high-severity Code Injection (CWE-94) vulnerability in Xenforo Xenforo. Its CVSS base score is 7.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 35.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and AC-6 (Least Privilege).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly and comprehensively mitigates the CVE by requiring timely flaw remediation through upgrading XenForo to patched versions 2.3.9 or 2.2.18.
Enforces least privilege to restrict admin users' capabilities, limiting the potential for malicious admins to exploit the RCE vulnerability in the admin panel.
Generates audit records for admin panel access and actions, allowing detection of anomalous activity indicative of RCE exploitation by authenticated admins.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE-2026-35056 enables remote code execution in the public-facing XenForo web application via the admin panel, directly facilitating T1190: Exploit Public-Facing Application.
NVD Description
XenForo before 2.3.9 and before 2.2.18 allows remote code execution (RCE) by authenticated, but malicious, admin users. An attacker with admin panel access can execute arbitrary code on the server.
Deeper analysisAI
CVE-2026-35056 is a remote code execution vulnerability (CWE-94) in XenForo forum software versions before 2.3.9 and before 2.2.18. It enables authenticated but malicious admin users to execute arbitrary code on the server via the admin panel. The vulnerability carries a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) and was published on 2026-04-01T01:16:41.593.
An attacker requires valid admin credentials and access to the XenForo admin panel to exploit this issue over the network with low complexity and no user interaction. Successful exploitation grants high-impact control over confidentiality, integrity, and availability on the affected server, allowing arbitrary code execution in the context of the web server process.
XenForo advisories recommend upgrading to version 2.3.9 or 2.2.18, which include fixes for this security issue. Additional details on the authenticated admin RCE are available in the VulnCheck advisory.
Details
- CWE(s)