CVE-2026-22894: CWE-22 in QNAP Systems Inc. File Station 5
A path traversal vulnerability has been reported to affect File Station 6. If a remote attacker gains a user account, they can then exploit the vulnerability to read the contents of unexpected files or system data. We have already fixed the vulnerability in the following version: File Station 5 5.5.6.5190 and later
AI Analysis
Technical Summary
CVE-2026-22894 is a path traversal vulnerability classified under CWE-22 that affects QNAP Systems Inc.'s File Station 5 software, specifically versions 5.5.x. File Station is a file management application commonly used on QNAP NAS devices to facilitate file access and sharing. The vulnerability allows an attacker who has already obtained a valid user account on the system to manipulate file path inputs to access files outside the intended directory scope. This can lead to unauthorized reading of sensitive system files or user data that should otherwise be inaccessible. The vulnerability does not require additional user interaction and can be exploited remotely over the network, given the attacker has valid credentials. The CVSS 4.0 base score is 1.3, reflecting low severity due to limited impact and the prerequisite of authenticated access. The vendor has addressed this vulnerability in File Station 5 version 5.5.6.5190 and later. No public exploits have been reported, but the presence of this flaw poses a risk of data leakage if attackers compromise user accounts. The flaw arises from insufficient validation of file path inputs, allowing directory traversal sequences to escape the intended file system boundaries.
Potential Impact
For European organizations, this vulnerability primarily threatens the confidentiality of data stored on QNAP NAS devices running vulnerable versions of File Station 5. Unauthorized access to system or user files could lead to exposure of sensitive corporate information, intellectual property, or personal data, potentially violating GDPR requirements. Although the vulnerability requires an attacker to have valid user credentials, compromised or weak user accounts could be leveraged to exploit this flaw. The impact on system integrity and availability is minimal, as the vulnerability only allows reading files, not modifying or deleting them. However, the exposure of sensitive data can have significant reputational and regulatory consequences. Organizations in sectors such as finance, healthcare, and critical infrastructure that rely on QNAP NAS for file storage and sharing are particularly at risk. The low CVSS score suggests the threat is not critical but still warrants timely remediation to prevent potential data breaches.
Mitigation Recommendations
1. Immediately upgrade all QNAP NAS devices running File Station 5 to version 5.5.6.5190 or later where the vulnerability is patched. 2. Enforce strong authentication policies, including complex passwords and multi-factor authentication, to reduce the risk of account compromise. 3. Limit user account privileges strictly to the minimum necessary to reduce the attack surface. 4. Monitor file access logs for unusual or unauthorized attempts to access sensitive files or directories outside normal usage patterns. 5. Implement network segmentation to restrict access to NAS devices only to trusted internal networks and users. 6. Regularly audit NAS device configurations and installed software versions to ensure compliance with security policies. 7. Educate users about phishing and credential theft risks to prevent initial account compromise. 8. Consider deploying endpoint detection and response (EDR) solutions that can alert on suspicious activities related to NAS access.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2026-22894: CWE-22 in QNAP Systems Inc. File Station 5
Description
A path traversal vulnerability has been reported to affect File Station 6. If a remote attacker gains a user account, they can then exploit the vulnerability to read the contents of unexpected files or system data. We have already fixed the vulnerability in the following version: File Station 5 5.5.6.5190 and later
AI-Powered Analysis
Technical Analysis
CVE-2026-22894 is a path traversal vulnerability classified under CWE-22 that affects QNAP Systems Inc.'s File Station 5 software, specifically versions 5.5.x. File Station is a file management application commonly used on QNAP NAS devices to facilitate file access and sharing. The vulnerability allows an attacker who has already obtained a valid user account on the system to manipulate file path inputs to access files outside the intended directory scope. This can lead to unauthorized reading of sensitive system files or user data that should otherwise be inaccessible. The vulnerability does not require additional user interaction and can be exploited remotely over the network, given the attacker has valid credentials. The CVSS 4.0 base score is 1.3, reflecting low severity due to limited impact and the prerequisite of authenticated access. The vendor has addressed this vulnerability in File Station 5 version 5.5.6.5190 and later. No public exploits have been reported, but the presence of this flaw poses a risk of data leakage if attackers compromise user accounts. The flaw arises from insufficient validation of file path inputs, allowing directory traversal sequences to escape the intended file system boundaries.
Potential Impact
For European organizations, this vulnerability primarily threatens the confidentiality of data stored on QNAP NAS devices running vulnerable versions of File Station 5. Unauthorized access to system or user files could lead to exposure of sensitive corporate information, intellectual property, or personal data, potentially violating GDPR requirements. Although the vulnerability requires an attacker to have valid user credentials, compromised or weak user accounts could be leveraged to exploit this flaw. The impact on system integrity and availability is minimal, as the vulnerability only allows reading files, not modifying or deleting them. However, the exposure of sensitive data can have significant reputational and regulatory consequences. Organizations in sectors such as finance, healthcare, and critical infrastructure that rely on QNAP NAS for file storage and sharing are particularly at risk. The low CVSS score suggests the threat is not critical but still warrants timely remediation to prevent potential data breaches.
Mitigation Recommendations
1. Immediately upgrade all QNAP NAS devices running File Station 5 to version 5.5.6.5190 or later where the vulnerability is patched. 2. Enforce strong authentication policies, including complex passwords and multi-factor authentication, to reduce the risk of account compromise. 3. Limit user account privileges strictly to the minimum necessary to reduce the attack surface. 4. Monitor file access logs for unusual or unauthorized attempts to access sensitive files or directories outside normal usage patterns. 5. Implement network segmentation to restrict access to NAS devices only to trusted internal networks and users. 6. Regularly audit NAS device configurations and installed software versions to ensure compliance with security policies. 7. Educate users about phishing and credential theft risks to prevent initial account compromise. 8. Consider deploying endpoint detection and response (EDR) solutions that can alert on suspicious activities related to NAS access.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- qnap
- Date Reserved
- 2026-01-13T07:49:08.783Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698c7a214b57a58fa195d103
Added to database: 2/11/2026, 12:46:25 PM
Last enriched: 2/11/2026, 1:01:08 PM
Last updated: 2/11/2026, 6:30:56 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2361: Uncontrolled Search Path Element in DALIBO PostgreSQL Anonymizer
HighCVE-2026-2360: Uncontrolled Search Path Element in DALIBO PostgreSQL Anonymizer
HighCVE-2026-0229: CWE-754 Improper Check for Unusual or Exceptional Conditions in Palo Alto Networks Cloud NGFW
MediumCVE-2026-0228: CWE-295 Improper Certificate Validation in Palo Alto Networks Cloud NGFW
LowCVE-2025-70085: n/a
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.