Elfinder

by Std42

Review your setup

Elfinder has some exploitation signals but is generally manageable with regular updates.

What to do
  1. Keep this software updated
  2. Review your configuration for unnecessary exposure
  3. Check for known-vulnerable components or plugins

What Attackers Target

Vulnerabilities with high exploit probability 40.0%
Confirmed actively exploited (CISA) 0.0%
Public exploit code available 6.7%
Based on 15 known vulnerabilities. Percentages show the proportion that are actively dangerous — a low percentage means most vulnerabilities in this product are not being exploited.

Most Dangerous Vulnerabilities

CVE CVSS Exploit Probability Confirmed
CVE-2021-32682 9.8 92.8%
CVE-2019-9194 9.8 92.7%
CVE-2022-26960 9.1 84.2%
CVE-2021-43421 9.8 79.5%
CVE-2021-23394 8.1 77.4%
CVE-2022-27115 9.8 14.8%
CVE-2023-35840 6.5 5.9%
CVE-2023-52044 9.8 2.6%
CVE-2018-9109 9.1 0.8%
CVE-2018-9110 9.1 0.8%
CVE-2021-45919 5.4 0.3%
CVE-2019-5884 5.9 0.3%
CVE-2024-38909 9.8 0.3%
CVE-2019-6257 7.7 0.2%
CVE-2023-52045 6.1 0.0%
42
/ 100
moderate-risk
Active Threat 40/50 · Critical
Exploit Availability 2/50 · Minimal

Score uses Wilson score intervals to account for sample size. Products with few CVEs are scored conservatively.