Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25161: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in AlistGo alist

0
High
VulnerabilityCVE-2026-25161cvecve-2026-25161cwe-22
Published: Wed Feb 04 2026 (02/04/2026, 19:40:04 UTC)
Source: CVE Database V5
Vendor/Project: AlistGo
Product: alist

Description

CVE-2026-25161 is a high-severity path traversal vulnerability in AlistGo's alist software versions prior to 3. 57. 0. It allows an authenticated attacker to bypass directory-level authorization by injecting traversal sequences into file names, enabling unauthorized file operations such as removal, movement, and copying across user boundaries within the same storage mount. The vulnerability affects multiple file operation handlers and compromises confidentiality, integrity, and availability of data. No user interaction is required beyond authentication, and the flaw has been patched in version 3. 57. 0. There are no known exploits in the wild yet. European organizations using vulnerable versions of alist are at risk, especially those relying on this software for file management across multiple storage backends.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/12/2026, 07:43:16 UTC

Technical Analysis

CVE-2026-25161 is a path traversal vulnerability classified under CWE-22 found in the alist file listing program developed by AlistGo. Alist supports multiple storage backends and is built using Gin and Solidjs frameworks. Versions prior to 3.57.0 contain a flaw in multiple file operation handlers where an authenticated attacker can inject directory traversal sequences (e.g., '../') into filename components. This injection bypasses directory-level authorization checks, allowing the attacker to perform unauthorized file operations such as deletion, movement, and copying of files across user boundaries within the same storage mount. The vulnerability compromises the confidentiality, integrity, and availability of files managed by alist. Exploitation requires authentication but no additional user interaction, making it relatively easy to exploit for authorized users. The issue was publicly disclosed and patched in version 3.57.0, which properly restricts pathname traversal. No public exploits have been reported yet, but the high CVSS score (8.8) reflects the critical impact of this vulnerability. Organizations using alist for file management should consider this a critical risk, especially in multi-user environments where file isolation is essential.

Potential Impact

For European organizations, this vulnerability poses a significant risk to data security and operational continuity. Unauthorized file operations can lead to data leakage, corruption, or loss, impacting confidentiality, integrity, and availability. Organizations relying on alist for managing shared storage environments may face insider threats or compromised accounts leading to lateral file access and manipulation. This can disrupt business processes, cause compliance violations (e.g., GDPR), and damage reputation. The ease of exploitation by any authenticated user increases the threat surface, especially in environments with many users or weak authentication controls. The vulnerability could also facilitate further attacks by modifying or deleting critical files. Given the increasing adoption of cloud and hybrid storage solutions in Europe, the impact is amplified in sectors such as finance, healthcare, and government where data integrity and confidentiality are paramount.

Mitigation Recommendations

The primary mitigation is to upgrade all affected alist instances to version 3.57.0 or later, where the vulnerability is patched. Organizations should audit and restrict user permissions rigorously to minimize the number of users with file operation privileges. Implement strong authentication mechanisms, including multi-factor authentication, to reduce the risk of compromised accounts. Conduct thorough logging and monitoring of file operations to detect suspicious activities indicative of traversal exploitation. Employ network segmentation and access controls to limit exposure of alist services to trusted users and networks. Additionally, perform regular security assessments and penetration testing focusing on file operation handlers. If upgrading immediately is not feasible, consider deploying web application firewalls (WAFs) with custom rules to detect and block traversal sequences in file operation requests. Finally, educate users about the risks of path traversal and enforce strict input validation policies.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-29T15:39:11.822Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6983a549f9fa50a62fa8d0d6

Added to database: 2/4/2026, 8:00:09 PM

Last enriched: 2/12/2026, 7:43:16 AM

Last updated: 3/22/2026, 3:32:07 AM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses