| Titre | Textpattern 4.9.1 Textpattern XML-RPC Arbitrary File Write |
|---|
| Description | Textpattern is an open-source project on GitHub, available at https://github.com/textpattern/textpattern
I have already obtained acknowledgment of this vulnerability from the development team.
For more details, please refer to the GitHub repository link below.
I have documented the exploitation method and the code audit in this repository:
https://github.com/LTX-GOD/Mycve/blob/main/Textpatterncms_en.md
|
|---|
| La source | ⚠️ https://github.com/LTX-GOD/Mycve/blob/main/Textpatterncms_en.md |
|---|
| Utilisateur | zsmaaa (UID 93294) |
|---|
| Soumission | 27/02/2026 14:38 (il y a 1 mois) |
|---|
| Modérer | 01/04/2026 17:57 (1 month later) |
|---|
| Statut | Accepté |
|---|
| Entrée VulDB | 354696 [Textpattern jusqu’à 4.9.1 XML-RPC rpc/TXP_RPCServer.php mt_uploadImage file.name directory traversal] |
|---|
| Points | 20 |
|---|