CVE-2026-25161: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in AlistGo alist
CVE-2026-25161 is a high-severity path traversal vulnerability in AlistGo's alist software versions prior to 3. 57. 0. It allows an authenticated attacker to bypass directory-level authorization by injecting traversal sequences into file names, enabling unauthorized file operations such as removal, movement, and copying across user boundaries within the same storage mount. The vulnerability affects multiple file operation handlers and compromises confidentiality, integrity, and availability of data. No user interaction is required beyond authentication, and the flaw has been patched in version 3. 57. 0. There are no known exploits in the wild yet. European organizations using vulnerable versions of alist are at risk, especially those relying on this software for file management across multiple storage backends.
AI Analysis
Technical Summary
CVE-2026-25161 is a path traversal vulnerability classified under CWE-22 found in the alist file listing program developed by AlistGo. Alist supports multiple storage backends and is built using Gin and Solidjs frameworks. Versions prior to 3.57.0 contain a flaw in multiple file operation handlers where an authenticated attacker can inject directory traversal sequences (e.g., '../') into filename components. This injection bypasses directory-level authorization checks, allowing the attacker to perform unauthorized file operations such as deletion, movement, and copying of files across user boundaries within the same storage mount. The vulnerability compromises the confidentiality, integrity, and availability of files managed by alist. Exploitation requires authentication but no additional user interaction, making it relatively easy to exploit for authorized users. The issue was publicly disclosed and patched in version 3.57.0, which properly restricts pathname traversal. No public exploits have been reported yet, but the high CVSS score (8.8) reflects the critical impact of this vulnerability. Organizations using alist for file management should consider this a critical risk, especially in multi-user environments where file isolation is essential.
Potential Impact
For European organizations, this vulnerability poses a significant risk to data security and operational continuity. Unauthorized file operations can lead to data leakage, corruption, or loss, impacting confidentiality, integrity, and availability. Organizations relying on alist for managing shared storage environments may face insider threats or compromised accounts leading to lateral file access and manipulation. This can disrupt business processes, cause compliance violations (e.g., GDPR), and damage reputation. The ease of exploitation by any authenticated user increases the threat surface, especially in environments with many users or weak authentication controls. The vulnerability could also facilitate further attacks by modifying or deleting critical files. Given the increasing adoption of cloud and hybrid storage solutions in Europe, the impact is amplified in sectors such as finance, healthcare, and government where data integrity and confidentiality are paramount.
Mitigation Recommendations
The primary mitigation is to upgrade all affected alist instances to version 3.57.0 or later, where the vulnerability is patched. Organizations should audit and restrict user permissions rigorously to minimize the number of users with file operation privileges. Implement strong authentication mechanisms, including multi-factor authentication, to reduce the risk of compromised accounts. Conduct thorough logging and monitoring of file operations to detect suspicious activities indicative of traversal exploitation. Employ network segmentation and access controls to limit exposure of alist services to trusted users and networks. Additionally, perform regular security assessments and penetration testing focusing on file operation handlers. If upgrading immediately is not feasible, consider deploying web application firewalls (WAFs) with custom rules to detect and block traversal sequences in file operation requests. Finally, educate users about the risks of path traversal and enforce strict input validation policies.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2026-25161: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in AlistGo alist
Description
CVE-2026-25161 is a high-severity path traversal vulnerability in AlistGo's alist software versions prior to 3. 57. 0. It allows an authenticated attacker to bypass directory-level authorization by injecting traversal sequences into file names, enabling unauthorized file operations such as removal, movement, and copying across user boundaries within the same storage mount. The vulnerability affects multiple file operation handlers and compromises confidentiality, integrity, and availability of data. No user interaction is required beyond authentication, and the flaw has been patched in version 3. 57. 0. There are no known exploits in the wild yet. European organizations using vulnerable versions of alist are at risk, especially those relying on this software for file management across multiple storage backends.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-25161 is a path traversal vulnerability classified under CWE-22 found in the alist file listing program developed by AlistGo. Alist supports multiple storage backends and is built using Gin and Solidjs frameworks. Versions prior to 3.57.0 contain a flaw in multiple file operation handlers where an authenticated attacker can inject directory traversal sequences (e.g., '../') into filename components. This injection bypasses directory-level authorization checks, allowing the attacker to perform unauthorized file operations such as deletion, movement, and copying of files across user boundaries within the same storage mount. The vulnerability compromises the confidentiality, integrity, and availability of files managed by alist. Exploitation requires authentication but no additional user interaction, making it relatively easy to exploit for authorized users. The issue was publicly disclosed and patched in version 3.57.0, which properly restricts pathname traversal. No public exploits have been reported yet, but the high CVSS score (8.8) reflects the critical impact of this vulnerability. Organizations using alist for file management should consider this a critical risk, especially in multi-user environments where file isolation is essential.
Potential Impact
For European organizations, this vulnerability poses a significant risk to data security and operational continuity. Unauthorized file operations can lead to data leakage, corruption, or loss, impacting confidentiality, integrity, and availability. Organizations relying on alist for managing shared storage environments may face insider threats or compromised accounts leading to lateral file access and manipulation. This can disrupt business processes, cause compliance violations (e.g., GDPR), and damage reputation. The ease of exploitation by any authenticated user increases the threat surface, especially in environments with many users or weak authentication controls. The vulnerability could also facilitate further attacks by modifying or deleting critical files. Given the increasing adoption of cloud and hybrid storage solutions in Europe, the impact is amplified in sectors such as finance, healthcare, and government where data integrity and confidentiality are paramount.
Mitigation Recommendations
The primary mitigation is to upgrade all affected alist instances to version 3.57.0 or later, where the vulnerability is patched. Organizations should audit and restrict user permissions rigorously to minimize the number of users with file operation privileges. Implement strong authentication mechanisms, including multi-factor authentication, to reduce the risk of compromised accounts. Conduct thorough logging and monitoring of file operations to detect suspicious activities indicative of traversal exploitation. Employ network segmentation and access controls to limit exposure of alist services to trusted users and networks. Additionally, perform regular security assessments and penetration testing focusing on file operation handlers. If upgrading immediately is not feasible, consider deploying web application firewalls (WAFs) with custom rules to detect and block traversal sequences in file operation requests. Finally, educate users about the risks of path traversal and enforce strict input validation policies.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-29T15:39:11.822Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6983a549f9fa50a62fa8d0d6
Added to database: 2/4/2026, 8:00:09 PM
Last enriched: 2/12/2026, 7:43:16 AM
Last updated: 3/22/2026, 3:32:07 AM
Views: 72
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.