Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1186: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in ABC PRO SP. Z O.O. EAP Legislator

0
High
VulnerabilityCVE-2026-1186cvecve-2026-1186cwe-22
Published: Mon Feb 02 2026 (02/02/2026, 13:59:56 UTC)
Source: CVE Database V5
Vendor/Project: ABC PRO SP. Z O.O.
Product: EAP Legislator

Description

EAP Legislator is vulnerable to Path Traversal in file extraction functionality. Attacker can prepare zipx archive (default file type used by the Legislator application) and choose arbitrary path outside the intended directory (e.x. system startup) where files will be extracted by the victim upon opening the file. This issue was fixed in version 2.25a.

AI-Powered Analysis

AILast updated: 02/02/2026, 14:29:43 UTC

Technical Analysis

CVE-2026-1186 is a path traversal vulnerability categorized under CWE-22 found in the EAP Legislator software developed by ABC PRO SP. Z O.O. The flaw exists in the file extraction functionality that processes zipx archives, the default file type used by the application. An attacker can create a specially crafted zipx archive containing file paths that traverse outside the intended extraction directory, such as system startup folders. When a victim opens this malicious archive, the application extracts files to arbitrary locations on the victim's system, potentially overwriting or adding files critical to system operation or security. This can lead to unauthorized file modification, privilege escalation, or persistence mechanisms. The vulnerability requires no privileges and no authentication but does require user interaction to open the malicious file. The CVSS 4.0 base score is 8.6, indicating high severity due to network attack vector, low attack complexity, no privileges required, user interaction needed, and high impact on confidentiality and integrity. The issue was publicly disclosed and fixed in version 2.25a. No known exploits have been reported in the wild, but the potential impact warrants immediate attention. The vulnerability was assigned and published by CERT-PL, indicating awareness in the Polish cybersecurity community.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially to entities relying on EAP Legislator for legal, governmental, or administrative document processing. Successful exploitation can lead to arbitrary file writes outside designated directories, enabling attackers to overwrite critical system files, implant malware, or disrupt system startup processes. This compromises system integrity and availability, potentially causing operational downtime or unauthorized access. Confidentiality may also be impacted if sensitive files are overwritten or replaced. The requirement for user interaction means phishing or social engineering could be used to deliver the malicious archive. Given the software’s use in sensitive sectors, the impact on trust, regulatory compliance (e.g., GDPR), and operational continuity can be severe. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits post-disclosure.

Mitigation Recommendations

1. Immediately upgrade all EAP Legislator installations to version 2.25a or later where the vulnerability is fixed. 2. Implement strict email and file filtering to block or quarantine zipx archives from untrusted sources. 3. Educate users on the risks of opening unsolicited or suspicious archive files, emphasizing verification of file origin. 4. Employ endpoint protection solutions capable of detecting anomalous file extraction behaviors or unauthorized file writes to critical directories. 5. Use application whitelisting to prevent unauthorized executables or scripts from running, especially those placed in startup folders. 6. Monitor system directories, particularly startup and system folders, for unexpected file changes or additions. 7. Consider sandboxing or opening archives in isolated environments before allowing extraction on production systems. 8. Maintain regular backups and ensure recovery procedures are tested to mitigate potential damage from exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
CERT-PL
Date Reserved
2026-01-19T13:17:10.720Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6980b180f9fa50a62f4545f1

Added to database: 2/2/2026, 2:15:28 PM

Last enriched: 2/2/2026, 2:29:43 PM

Last updated: 3/19/2026, 6:53:00 PM

Views: 54

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses