CVE-2026-43616

Published: Mag 04, 2026 Last Modified: Mag 04, 2026
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 6,8
Attack Vector: local
Attack Complexity: low
Privileges Required: none
User Interaction: active
Confidentiality: N/A
Integrity: N/A
Availability: N/A
HIGH 7,1
Attack Vector: local
Attack Complexity: low
Privileges Required: none
User Interaction: required
Scope: unchanged
Confidentiality: none
Integrity: high
Availability: high

Description

AI Translation Available

Detect-It-Easy prior to 3.21 contains a path traversal vulnerability that allows attackers to write arbitrary files to the filesystem by crafting malicious archive entries with relative traversal sequences or absolute paths. Attackers can exploit insufficient path normalization during archive extraction to write files outside the intended extraction directory and achieve persistent code execution by overwriting user startup scripts.

23

Relative Path Traversal

Draft
Common Consequences
Security Scopes Affected:
Integrity Confidentiality Availability
Potential Impacts:
Execute Unauthorized Code Or Commands Modify Files Or Directories Read Files Or Directories Dos: Crash, Exit, Or Restart
Applicable Platforms
Technologies: AI/ML, Not Technology-Specific, Web Based
View CWE Details
https://github.com/horsicq/Detect-It-Easy
https://github.com/horsicq/DIE-engine/commit/7fd300b926daf19707b2a36f0abe8b60a5…
https://github.com/horsicq/DIE-engine/commit/cbbe1688e58ffd430d284bf65f336973f0…
https://github.com/horsicq/DIE-engine/releases/tag/3.21
https://github.com/horsicq/Formats/commit/56cdf50ee3c72c56284e2819b23e98332842d…
https://github.com/horsicq/XArchive/commit/6a2aa84c2fd120b704f76bb5c5ee3e9b5a7a…
https://www.vulncheck.com/advisories/detect-it-easy-path-traversal-arbitrary-fi…