CVE-2025-41359: CWE-428 Unquoted search path or element in Smallsrv Small HTTP
Vulnerability related to an unquoted service path in Small HTTP Server 3.06.36, specifically affecting the executable located at 'C:\Program Files (x86)\shttps_mg\http.exe service'. This misconfiguration allows a local attacker to place a malicious executable with the same name in a higher priority directory, causing the service to execute the malicious file instead of the legitimate one. Exploiting this flaw could allow arbitrary code execution, unauthorized access to the system, or service disruption. To mitigate the risk, the service path must be properly quoted, and systems must be kept up to date with security patches, while restricting physical and network access.
AI Analysis
Technical Summary
CVE-2025-41359 is a vulnerability classified under CWE-428 (Unquoted Search Path or Element) affecting Small HTTP Server version 3.06.36. The issue arises because the service executable path 'C:\Program Files (x86)\shttps_mg\http.exe service' is not properly quoted. Windows interprets unquoted paths containing spaces by splitting them at the spaces and searching for executables in each resulting directory segment in order of precedence. This behavior allows a local attacker with limited privileges to place a malicious executable named 'http.exe' or similarly named in a directory higher in the search order (e.g., 'C:\Program Files (x86)\shttps_mg\http.exe' could be interpreted as 'C:\Program.exe' if unquoted). When the service starts, it may execute the attacker's malicious binary instead of the legitimate one, leading to arbitrary code execution. The vulnerability requires local access and low privileges but no user interaction or authentication beyond local presence. The CVSS 4.0 score of 8.5 reflects the high impact on confidentiality, integrity, and availability, combined with relatively low attack complexity. No public exploits have been reported yet, but the risk remains significant due to the potential for privilege escalation and system compromise. The root cause is a common Windows service misconfiguration that can be mitigated by quoting the executable path in the service configuration and ensuring proper permissions on directories and executables.
Potential Impact
If exploited, this vulnerability allows a local attacker to execute arbitrary code with the privileges of the Small HTTP service, potentially leading to unauthorized access, data theft, service disruption, or full system compromise. Since the service likely runs with elevated privileges, the attacker could escalate privileges from a low-privileged user to system-level control. This can undermine system integrity and availability, disrupt web services, and facilitate further lateral movement within an organization’s network. The vulnerability's exploitation does not require user interaction, increasing the risk in environments where local access is possible. Organizations relying on Small HTTP Server 3.06.36, especially in critical infrastructure or internet-facing roles, face significant operational and security risks if this flaw is not addressed promptly.
Mitigation Recommendations
1. Immediately verify and update the service executable path to be properly quoted in the Windows service configuration to prevent path hijacking. 2. Restrict write permissions on all directories in the service executable path to prevent unauthorized file placement by low-privileged users. 3. Limit local user access to systems running Small HTTP Server to trusted personnel only, and enforce strict access controls. 4. Monitor and audit service startup logs and file system changes in the service directories for signs of suspicious activity. 5. Apply any vendor patches or updates addressing this vulnerability as soon as they become available. 6. Consider running the service with the least privileges necessary to reduce the impact of potential exploitation. 7. Employ application whitelisting or endpoint protection solutions that can detect and block unauthorized executables from running. 8. Regularly review and harden Windows service configurations to avoid similar unquoted path vulnerabilities.
Affected Countries
United States, Germany, United Kingdom, France, Japan, South Korea, Canada, Australia, Netherlands, India
CVE-2025-41359: CWE-428 Unquoted search path or element in Smallsrv Small HTTP
Description
Vulnerability related to an unquoted service path in Small HTTP Server 3.06.36, specifically affecting the executable located at 'C:\Program Files (x86)\shttps_mg\http.exe service'. This misconfiguration allows a local attacker to place a malicious executable with the same name in a higher priority directory, causing the service to execute the malicious file instead of the legitimate one. Exploiting this flaw could allow arbitrary code execution, unauthorized access to the system, or service disruption. To mitigate the risk, the service path must be properly quoted, and systems must be kept up to date with security patches, while restricting physical and network access.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-41359 is a vulnerability classified under CWE-428 (Unquoted Search Path or Element) affecting Small HTTP Server version 3.06.36. The issue arises because the service executable path 'C:\Program Files (x86)\shttps_mg\http.exe service' is not properly quoted. Windows interprets unquoted paths containing spaces by splitting them at the spaces and searching for executables in each resulting directory segment in order of precedence. This behavior allows a local attacker with limited privileges to place a malicious executable named 'http.exe' or similarly named in a directory higher in the search order (e.g., 'C:\Program Files (x86)\shttps_mg\http.exe' could be interpreted as 'C:\Program.exe' if unquoted). When the service starts, it may execute the attacker's malicious binary instead of the legitimate one, leading to arbitrary code execution. The vulnerability requires local access and low privileges but no user interaction or authentication beyond local presence. The CVSS 4.0 score of 8.5 reflects the high impact on confidentiality, integrity, and availability, combined with relatively low attack complexity. No public exploits have been reported yet, but the risk remains significant due to the potential for privilege escalation and system compromise. The root cause is a common Windows service misconfiguration that can be mitigated by quoting the executable path in the service configuration and ensuring proper permissions on directories and executables.
Potential Impact
If exploited, this vulnerability allows a local attacker to execute arbitrary code with the privileges of the Small HTTP service, potentially leading to unauthorized access, data theft, service disruption, or full system compromise. Since the service likely runs with elevated privileges, the attacker could escalate privileges from a low-privileged user to system-level control. This can undermine system integrity and availability, disrupt web services, and facilitate further lateral movement within an organization’s network. The vulnerability's exploitation does not require user interaction, increasing the risk in environments where local access is possible. Organizations relying on Small HTTP Server 3.06.36, especially in critical infrastructure or internet-facing roles, face significant operational and security risks if this flaw is not addressed promptly.
Mitigation Recommendations
1. Immediately verify and update the service executable path to be properly quoted in the Windows service configuration to prevent path hijacking. 2. Restrict write permissions on all directories in the service executable path to prevent unauthorized file placement by low-privileged users. 3. Limit local user access to systems running Small HTTP Server to trusted personnel only, and enforce strict access controls. 4. Monitor and audit service startup logs and file system changes in the service directories for signs of suspicious activity. 5. Apply any vendor patches or updates addressing this vulnerability as soon as they become available. 6. Consider running the service with the least privileges necessary to reduce the impact of potential exploitation. 7. Employ application whitelisting or endpoint protection solutions that can detect and block unauthorized executables from running. 8. Regularly review and harden Windows service configurations to avoid similar unquoted path vulnerabilities.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- INCIBE
- Date Reserved
- 2025-04-16T09:57:04.871Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69c52aaff4197a8e3bc10dfe
Added to database: 3/26/2026, 12:46:39 PM
Last enriched: 3/26/2026, 1:00:59 PM
Last updated: 3/26/2026, 2:49:04 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.