Home

Description

ALEAPP (Android Logs Events And Protobuf Parser) through 3.4.0 contains a path traversal vulnerability in the NQ_Vault.py artifact parser that uses attacker-controlled file_name_from values from a database directly as the output filename, allowing arbitrary file writes outside the report output directory. An attacker can embed a path traversal payload such as ../../../outside_written.bin in the database to write files to arbitrary locations, potentially achieving code execution by overwriting executable files or configuration.

PUBLISHED Reserved 2026-04-08 | Published 2026-04-08 | Updated 2026-04-09 | Assigner VulnCheck




HIGH: 8.4CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N

HIGH: 7.3CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L

Problem types

CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

Default status
unaffected

Any version
affected

0cafd8fe0027663420eb3d0fa821b2d1a713880d (git)
unaffected

Credits

Mobasi Security Team finder

References

github.com/abrignoni/aleapp/pull/669 (Pull Request) product

github.com/...ommit/0cafd8fe0027663420eb3d0fa821b2d1a713880d (Patch Commit) patch

mobasi.ai/sentinel (Mobasi Sentinel Vulnerability Index) vendor-advisory

www.vulncheck.com/...nq-vault-artifact-parser-path-traversal (VulnCheck Advisory: ALEAPP NQ Vault Artifact Parser Path Traversal) third-party-advisory

cve.org (CVE-2026-40027)

nvd.nist.gov (CVE-2026-40027)

Download JSON