Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25160: CWE-295: Improper Certificate Validation in AlistGo alist

0
Critical
VulnerabilityCVE-2026-25160cvecve-2026-25160cwe-295
Published: Wed Feb 04 2026 (02/04/2026, 19:40:01 UTC)
Source: CVE Database V5
Vendor/Project: AlistGo
Product: alist

Description

CVE-2026-25160 is a critical vulnerability in AlistGo's alist file listing program prior to version 3. 57. 0, where TLS certificate verification is disabled by default for outgoing storage communications. This improper certificate validation (CWE-295) allows attackers to perform Man-in-the-Middle (MitM) attacks, enabling decryption, theft, and manipulation of data in transit. The vulnerability affects confidentiality and integrity but not availability, and requires no authentication or user interaction. The issue has been patched in version 3. 57. 0. European organizations using affected versions are at high risk, especially those handling sensitive data or using alist for multi-storage file management. Mitigation involves immediate upgrade to version 3.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/12/2026, 07:42:59 UTC

Technical Analysis

CVE-2026-25160 identifies a critical security flaw in the alist file listing application developed by AlistGo, specifically versions prior to 3.57.0. The vulnerability stems from improper certificate validation (CWE-295) where the application disables TLS certificate verification by default for all outgoing communications to storage drivers. This misconfiguration exposes the system to Man-in-the-Middle (MitM) attacks, allowing adversaries positioned on the network path to intercept, decrypt, and modify data transmitted between alist and its storage backends. Since TLS verification is disabled, the application does not authenticate the storage server's identity, making it trivial for attackers to impersonate legitimate storage endpoints. The vulnerability affects the confidentiality and integrity of data but does not impact availability. Exploitation requires no privileges or user interaction, making it highly accessible to attackers. The flaw was publicly disclosed and assigned CVE-2026-25160 with a CVSS v3.1 score of 9.1, indicating critical severity. The issue was addressed in alist version 3.57.0 by enabling TLS certificate verification by default, thereby restoring proper cryptographic validation and preventing MitM attacks. Organizations using alist for multi-storage file management should prioritize upgrading to the patched version to mitigate risks.

Potential Impact

For European organizations, the impact of CVE-2026-25160 is significant due to the potential exposure of sensitive data transmitted during storage operations. Confidentiality is severely compromised as attackers can decrypt and steal data, including potentially sensitive business or personal information. Integrity is also at risk since attackers can manipulate data in transit, leading to corrupted or maliciously altered files. This can disrupt business processes, cause data breaches, and damage organizational reputation. The vulnerability does not affect availability, but the loss of trust in data integrity and confidentiality can have cascading operational and compliance consequences, especially under GDPR and other data protection regulations. Organizations relying on alist for managing multiple storage backends, including cloud or on-premises storage, are particularly vulnerable. The ease of exploitation without authentication or user interaction increases the threat level, making it critical for European entities to address this promptly. Failure to patch could lead to targeted attacks, especially in sectors like finance, healthcare, and government where data sensitivity is paramount.

Mitigation Recommendations

1. Immediately upgrade all instances of alist to version 3.57.0 or later, where TLS certificate verification is enabled by default. 2. Audit all storage driver configurations to ensure TLS certificate validation is explicitly enabled and enforced. 3. Implement network-level protections such as TLS interception detection and anomaly monitoring to identify potential MitM attempts. 4. Use network segmentation and zero-trust principles to limit exposure of storage communication channels. 5. Regularly review and update cryptographic libraries and dependencies used by alist to maintain security posture. 6. Conduct security awareness training for administrators managing alist deployments to recognize and respond to suspicious network activity. 7. Monitor logs for unusual storage communication patterns that may indicate exploitation attempts. 8. Consider deploying endpoint detection and response (EDR) solutions to detect lateral movement or data exfiltration attempts following a MitM attack. 9. Engage in vulnerability management practices to promptly apply patches and validate configurations across all environments.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-29T15:39:11.822Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6983a549f9fa50a62fa8d0d2

Added to database: 2/4/2026, 8:00:09 PM

Last enriched: 2/12/2026, 7:42:59 AM

Last updated: 3/22/2026, 2:25:06 AM

Views: 106

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses