Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22894: CWE-22 in QNAP Systems Inc. File Station 5

0
Low
VulnerabilityCVE-2026-22894cvecve-2026-22894cwe-22
Published: Wed Feb 11 2026 (02/11/2026, 12:15:21 UTC)
Source: CVE Database V5
Vendor/Project: QNAP Systems Inc.
Product: File Station 5

Description

CVE-2026-22894 is a path traversal vulnerability in QNAP Systems Inc. 's File Station 5 (version 5. 5. x). A remote attacker with a valid user account can exploit this flaw to access unauthorized files and system data by manipulating file paths. The vulnerability does not require user interaction and has a low CVSS score of 1. 3, indicating limited impact and ease of exploitation. The issue has been fixed in File Station 5 version 5. 5. 6.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/18/2026, 15:09:55 UTC

Technical Analysis

CVE-2026-22894 is a path traversal vulnerability classified under CWE-22 affecting QNAP Systems Inc.'s File Station 5, specifically versions 5.5.x. The vulnerability allows an authenticated remote attacker to manipulate file path inputs to access files outside the intended directory scope, potentially reading sensitive system or user data that should be inaccessible. The flaw arises from insufficient validation or sanitization of file path parameters within the File Station 5 application, enabling directory traversal attacks. Exploitation requires the attacker to have a valid user account on the system, but no additional user interaction or elevated privileges are necessary. The vulnerability has a CVSS 4.0 base score of 1.3, reflecting low impact primarily due to the requirement for authentication and limited confidentiality impact. The vendor has addressed this issue in version 5.5.6.5190 and later, mitigating the risk by properly validating file paths to prevent traversal. No public exploits or active exploitation campaigns have been reported to date. The vulnerability could be leveraged by attackers who have gained user credentials, such as through phishing or credential stuffing, to escalate their access to sensitive files on affected QNAP NAS devices running File Station 5.

Potential Impact

For European organizations, the primary impact of this vulnerability is unauthorized disclosure of sensitive files stored on QNAP NAS devices running vulnerable File Station 5 versions. This could include configuration files, user data, or system information that may aid further attacks or data breaches. While the vulnerability does not allow privilege escalation or remote code execution, the exposure of sensitive data can compromise confidentiality and potentially lead to compliance violations under GDPR if personal data is accessed. Organizations relying on QNAP NAS for critical file storage or backup may face operational risks if sensitive data is exposed. The requirement for valid user credentials limits the attack surface to insiders or attackers who have already compromised user accounts, but this still represents a significant risk in environments with weak authentication controls. Given the widespread use of QNAP devices in European SMBs and enterprises, the vulnerability could affect a broad range of sectors including finance, healthcare, and government, where data confidentiality is paramount.

Mitigation Recommendations

European organizations should immediately verify the version of QNAP File Station 5 deployed and upgrade to version 5.5.6.5190 or later where the vulnerability is patched. Implement strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. Regularly audit user accounts and permissions to ensure that only authorized personnel have access to File Station. Employ network segmentation to limit access to NAS devices from untrusted networks. Monitor access logs for unusual file access patterns that may indicate exploitation attempts. Additionally, consider deploying endpoint detection and response (EDR) solutions to detect lateral movement or suspicious activity related to NAS devices. Educate users on phishing and credential security to prevent initial account compromise. Finally, maintain up-to-date backups and incident response plans to quickly recover from any potential data exposure incidents.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
qnap
Date Reserved
2026-01-13T07:49:08.783Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698c7a214b57a58fa195d103

Added to database: 2/11/2026, 12:46:25 PM

Last enriched: 2/18/2026, 3:09:55 PM

Last updated: 3/28/2026, 8:30:23 PM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses