Soumettre #769166: Textpattern 4.9.1 Textpattern XML-RPC Arbitrary File Writeinformation

TitreTextpattern 4.9.1 Textpattern XML-RPC Arbitrary File Write
DescriptionTextpattern is an open-source project on GitHub, available at https://github.com/textpattern/textpattern I have already obtained acknowledgment of this vulnerability from the development team. For more details, please refer to the GitHub repository link below. I have documented the exploitation method and the code audit in this repository: https://github.com/LTX-GOD/Mycve/blob/main/Textpatterncms_en.md
La source⚠️ https://github.com/LTX-GOD/Mycve/blob/main/Textpatterncms_en.md
Utilisateur
 zsmaaa (UID 93294)
Soumission27/02/2026 14:38 (il y a 1 mois)
Modérer01/04/2026 17:57 (1 month later)
StatutAccepté
Entrée VulDB354696 [Textpattern jusqu’à 4.9.1 XML-RPC rpc/TXP_RPCServer.php mt_uploadImage file.name directory traversal]
Points20

Do you want to use VulDB in your project?

Use the official API to access entries easily!