Path Traversal Vulnerability in Admidio User Management Solution
CVE-2026-41655

6.5MEDIUM

Key Information:

Vendor

Admidio

Status
Vendor
CVE Published:
7 May 2026

What is CVE-2026-41655?

Admidio, an open-source user management solution, has a path traversal vulnerability due to improper validation of the ecard_template POST parameter before it is used in file access functions. This flaw allows authenticated users to exploit the ecard_preview.php endpoint by crafting malicious requests that include path traversal payloads (e.g., ../config.php). If successfully exploited, an attacker can read arbitrary files on the server, including sensitive configuration files that may contain database credentials. This vulnerability has been addressed in version 5.0.9, which is essential for users to update to in order to ensure the security of their installations.

Affected Version(s)

admidio < 5.0.9

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.