Description
STIGQter is an open-source reimplementation of DISA's STIG Viewer. From 0.1.2 to before 1.2.7, an attacker can achieve local code execution (LCE) with the privileges of the user running STIGQter. This requires user interaction: the victim must open the malicious .stigqter file and explicitly run the "Export HTML" action. This vulnerability is fixed in 1.2.7.
Problem types
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE-73: External Control of File Name or Path
Product status
References
www.bitwizemusic.com/security/advisories/bve-2026-0007/
github.com/...IGQter/security/advisories/GHSA-mcv5-5j7p-vqh7
www.bitwizemusic.com/security/advisories/bve-2026-0007