CVE-2026-1186: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in ABC PRO SP. Z O.O. EAP Legislator
EAP Legislator is vulnerable to Path Traversal in file extraction functionality. Attacker can prepare zipx archive (default file type used by the Legislator application) and choose arbitrary path outside the intended directory (e.x. system startup) where files will be extracted by the victim upon opening the file. This issue was fixed in version 2.25a.
AI Analysis
Technical Summary
CVE-2026-1186 is a path traversal vulnerability categorized under CWE-22 found in the EAP Legislator software developed by ABC PRO SP. Z O.O. The flaw exists in the file extraction functionality that processes zipx archives, the default file type used by the application. An attacker can create a specially crafted zipx archive containing file paths that traverse outside the intended extraction directory, such as system startup folders. When a victim opens this malicious archive, the application extracts files to arbitrary locations on the victim's system, potentially overwriting or adding files critical to system operation or security. This can lead to unauthorized file modification, privilege escalation, or persistence mechanisms. The vulnerability requires no privileges and no authentication but does require user interaction to open the malicious file. The CVSS 4.0 base score is 8.6, indicating high severity due to network attack vector, low attack complexity, no privileges required, user interaction needed, and high impact on confidentiality and integrity. The issue was publicly disclosed and fixed in version 2.25a. No known exploits have been reported in the wild, but the potential impact warrants immediate attention. The vulnerability was assigned and published by CERT-PL, indicating awareness in the Polish cybersecurity community.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially to entities relying on EAP Legislator for legal, governmental, or administrative document processing. Successful exploitation can lead to arbitrary file writes outside designated directories, enabling attackers to overwrite critical system files, implant malware, or disrupt system startup processes. This compromises system integrity and availability, potentially causing operational downtime or unauthorized access. Confidentiality may also be impacted if sensitive files are overwritten or replaced. The requirement for user interaction means phishing or social engineering could be used to deliver the malicious archive. Given the software’s use in sensitive sectors, the impact on trust, regulatory compliance (e.g., GDPR), and operational continuity can be severe. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits post-disclosure.
Mitigation Recommendations
1. Immediately upgrade all EAP Legislator installations to version 2.25a or later where the vulnerability is fixed. 2. Implement strict email and file filtering to block or quarantine zipx archives from untrusted sources. 3. Educate users on the risks of opening unsolicited or suspicious archive files, emphasizing verification of file origin. 4. Employ endpoint protection solutions capable of detecting anomalous file extraction behaviors or unauthorized file writes to critical directories. 5. Use application whitelisting to prevent unauthorized executables or scripts from running, especially those placed in startup folders. 6. Monitor system directories, particularly startup and system folders, for unexpected file changes or additions. 7. Consider sandboxing or opening archives in isolated environments before allowing extraction on production systems. 8. Maintain regular backups and ensure recovery procedures are tested to mitigate potential damage from exploitation.
Affected Countries
Poland, Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2026-1186: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in ABC PRO SP. Z O.O. EAP Legislator
Description
EAP Legislator is vulnerable to Path Traversal in file extraction functionality. Attacker can prepare zipx archive (default file type used by the Legislator application) and choose arbitrary path outside the intended directory (e.x. system startup) where files will be extracted by the victim upon opening the file. This issue was fixed in version 2.25a.
AI-Powered Analysis
Technical Analysis
CVE-2026-1186 is a path traversal vulnerability categorized under CWE-22 found in the EAP Legislator software developed by ABC PRO SP. Z O.O. The flaw exists in the file extraction functionality that processes zipx archives, the default file type used by the application. An attacker can create a specially crafted zipx archive containing file paths that traverse outside the intended extraction directory, such as system startup folders. When a victim opens this malicious archive, the application extracts files to arbitrary locations on the victim's system, potentially overwriting or adding files critical to system operation or security. This can lead to unauthorized file modification, privilege escalation, or persistence mechanisms. The vulnerability requires no privileges and no authentication but does require user interaction to open the malicious file. The CVSS 4.0 base score is 8.6, indicating high severity due to network attack vector, low attack complexity, no privileges required, user interaction needed, and high impact on confidentiality and integrity. The issue was publicly disclosed and fixed in version 2.25a. No known exploits have been reported in the wild, but the potential impact warrants immediate attention. The vulnerability was assigned and published by CERT-PL, indicating awareness in the Polish cybersecurity community.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially to entities relying on EAP Legislator for legal, governmental, or administrative document processing. Successful exploitation can lead to arbitrary file writes outside designated directories, enabling attackers to overwrite critical system files, implant malware, or disrupt system startup processes. This compromises system integrity and availability, potentially causing operational downtime or unauthorized access. Confidentiality may also be impacted if sensitive files are overwritten or replaced. The requirement for user interaction means phishing or social engineering could be used to deliver the malicious archive. Given the software’s use in sensitive sectors, the impact on trust, regulatory compliance (e.g., GDPR), and operational continuity can be severe. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits post-disclosure.
Mitigation Recommendations
1. Immediately upgrade all EAP Legislator installations to version 2.25a or later where the vulnerability is fixed. 2. Implement strict email and file filtering to block or quarantine zipx archives from untrusted sources. 3. Educate users on the risks of opening unsolicited or suspicious archive files, emphasizing verification of file origin. 4. Employ endpoint protection solutions capable of detecting anomalous file extraction behaviors or unauthorized file writes to critical directories. 5. Use application whitelisting to prevent unauthorized executables or scripts from running, especially those placed in startup folders. 6. Monitor system directories, particularly startup and system folders, for unexpected file changes or additions. 7. Consider sandboxing or opening archives in isolated environments before allowing extraction on production systems. 8. Maintain regular backups and ensure recovery procedures are tested to mitigate potential damage from exploitation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- CERT-PL
- Date Reserved
- 2026-01-19T13:17:10.720Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6980b180f9fa50a62f4545f1
Added to database: 2/2/2026, 2:15:28 PM
Last enriched: 2/2/2026, 2:29:43 PM
Last updated: 3/19/2026, 6:53:00 PM
Views: 54
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.