CVE-2026-25161: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in AlistGo alist
CVE-2026-25161 is a high-severity path traversal vulnerability affecting AlistGo's alist software versions prior to 3. 57. 0. It allows an authenticated attacker to bypass directory-level authorization by injecting traversal sequences into filenames, enabling unauthorized file operations such as removal, movement, and copying across user boundaries within the same storage mount. The vulnerability impacts confidentiality, integrity, and availability of files managed by alist. No user interaction is required beyond authentication, and the flaw is remotely exploitable over the network. The issue has been patched in version 3. 57. 0. European organizations using vulnerable alist versions are at risk, especially those relying on alist for multi-storage file management.
AI Analysis
Technical Summary
CVE-2026-25161 is a path traversal vulnerability classified under CWE-22 found in the alist file listing program developed by AlistGo. Alist supports multiple storage backends and is built using Gin and Solidjs frameworks. Versions prior to 3.57.0 contain a flaw in multiple file operation handlers that improperly limit pathname inputs. Authenticated attackers can inject directory traversal sequences (e.g., '../') into filename components, bypassing directory-level authorization checks. This enables unauthorized file operations such as deletion, movement, and copying of files across user boundaries within the same storage mount point. The vulnerability affects confidentiality by exposing or allowing deletion of files, integrity by permitting unauthorized modification or movement, and availability by enabling file removal. The flaw is remotely exploitable over the network with low attack complexity and does not require user interaction beyond authentication. The vulnerability was publicly disclosed and patched in version 3.57.0. No known exploits are currently reported in the wild, but the high CVSS score of 8.8 reflects the significant risk posed by this vulnerability if exploited.
Potential Impact
For European organizations, this vulnerability poses a serious risk to data confidentiality, integrity, and availability, especially for those using alist to manage multi-storage environments. Attackers with valid credentials can escalate their privileges within the storage system, accessing or manipulating files belonging to other users. This can lead to data breaches, loss of critical files, disruption of business operations, and potential compliance violations under GDPR due to unauthorized data access or alteration. Organizations relying on alist for cloud or on-premises file management may face operational downtime and reputational damage if exploited. The vulnerability's network accessibility and lack of user interaction requirements increase the likelihood of exploitation in environments with weak authentication controls or insider threats.
Mitigation Recommendations
The primary mitigation is to upgrade all affected alist instances to version 3.57.0 or later, where the vulnerability has been patched. Organizations should audit their current deployments to identify vulnerable versions and apply updates promptly. Additionally, implement strict access controls and monitoring on file operation logs to detect suspicious activities indicative of traversal attacks. Employ multi-factor authentication to reduce the risk of credential compromise. Network segmentation and limiting access to alist management interfaces can reduce exposure. Conduct regular security assessments and penetration testing focused on file operation handlers to ensure no residual path traversal issues remain. Finally, educate administrators and users about the risks of path traversal vulnerabilities and the importance of timely patching.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2026-25161: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in AlistGo alist
Description
CVE-2026-25161 is a high-severity path traversal vulnerability affecting AlistGo's alist software versions prior to 3. 57. 0. It allows an authenticated attacker to bypass directory-level authorization by injecting traversal sequences into filenames, enabling unauthorized file operations such as removal, movement, and copying across user boundaries within the same storage mount. The vulnerability impacts confidentiality, integrity, and availability of files managed by alist. No user interaction is required beyond authentication, and the flaw is remotely exploitable over the network. The issue has been patched in version 3. 57. 0. European organizations using vulnerable alist versions are at risk, especially those relying on alist for multi-storage file management.
AI-Powered Analysis
Technical Analysis
CVE-2026-25161 is a path traversal vulnerability classified under CWE-22 found in the alist file listing program developed by AlistGo. Alist supports multiple storage backends and is built using Gin and Solidjs frameworks. Versions prior to 3.57.0 contain a flaw in multiple file operation handlers that improperly limit pathname inputs. Authenticated attackers can inject directory traversal sequences (e.g., '../') into filename components, bypassing directory-level authorization checks. This enables unauthorized file operations such as deletion, movement, and copying of files across user boundaries within the same storage mount point. The vulnerability affects confidentiality by exposing or allowing deletion of files, integrity by permitting unauthorized modification or movement, and availability by enabling file removal. The flaw is remotely exploitable over the network with low attack complexity and does not require user interaction beyond authentication. The vulnerability was publicly disclosed and patched in version 3.57.0. No known exploits are currently reported in the wild, but the high CVSS score of 8.8 reflects the significant risk posed by this vulnerability if exploited.
Potential Impact
For European organizations, this vulnerability poses a serious risk to data confidentiality, integrity, and availability, especially for those using alist to manage multi-storage environments. Attackers with valid credentials can escalate their privileges within the storage system, accessing or manipulating files belonging to other users. This can lead to data breaches, loss of critical files, disruption of business operations, and potential compliance violations under GDPR due to unauthorized data access or alteration. Organizations relying on alist for cloud or on-premises file management may face operational downtime and reputational damage if exploited. The vulnerability's network accessibility and lack of user interaction requirements increase the likelihood of exploitation in environments with weak authentication controls or insider threats.
Mitigation Recommendations
The primary mitigation is to upgrade all affected alist instances to version 3.57.0 or later, where the vulnerability has been patched. Organizations should audit their current deployments to identify vulnerable versions and apply updates promptly. Additionally, implement strict access controls and monitoring on file operation logs to detect suspicious activities indicative of traversal attacks. Employ multi-factor authentication to reduce the risk of credential compromise. Network segmentation and limiting access to alist management interfaces can reduce exposure. Conduct regular security assessments and penetration testing focused on file operation handlers to ensure no residual path traversal issues remain. Finally, educate administrators and users about the risks of path traversal vulnerabilities and the importance of timely patching.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-29T15:39:11.822Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6983a549f9fa50a62fa8d0d6
Added to database: 2/4/2026, 8:00:09 PM
Last enriched: 2/4/2026, 8:14:40 PM
Last updated: 2/4/2026, 10:17:50 PM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25584: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in InternationalColorConsortium iccDEV
HighCVE-2026-25583: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in InternationalColorConsortium iccDEV
HighCVE-2026-25582: CWE-122: Heap-based Buffer Overflow in InternationalColorConsortium iccDEV
HighCVE-2026-25541: CWE-680: Integer Overflow to Buffer Overflow in tokio-rs bytes
MediumCVE-2026-1892: Improper Authorization in WeKan
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.