Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25161: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in AlistGo alist

0
High
VulnerabilityCVE-2026-25161cvecve-2026-25161cwe-22
Published: Wed Feb 04 2026 (02/04/2026, 19:40:04 UTC)
Source: CVE Database V5
Vendor/Project: AlistGo
Product: alist

Description

CVE-2026-25161 is a high-severity path traversal vulnerability affecting AlistGo's alist software versions prior to 3. 57. 0. It allows an authenticated attacker to bypass directory-level authorization by injecting traversal sequences into filenames, enabling unauthorized file operations such as removal, movement, and copying across user boundaries within the same storage mount. The vulnerability impacts confidentiality, integrity, and availability of files managed by alist. No user interaction is required beyond authentication, and the flaw is remotely exploitable over the network. The issue has been patched in version 3. 57. 0. European organizations using vulnerable alist versions are at risk, especially those relying on alist for multi-storage file management.

AI-Powered Analysis

AILast updated: 02/04/2026, 20:14:40 UTC

Technical Analysis

CVE-2026-25161 is a path traversal vulnerability classified under CWE-22 found in the alist file listing program developed by AlistGo. Alist supports multiple storage backends and is built using Gin and Solidjs frameworks. Versions prior to 3.57.0 contain a flaw in multiple file operation handlers that improperly limit pathname inputs. Authenticated attackers can inject directory traversal sequences (e.g., '../') into filename components, bypassing directory-level authorization checks. This enables unauthorized file operations such as deletion, movement, and copying of files across user boundaries within the same storage mount point. The vulnerability affects confidentiality by exposing or allowing deletion of files, integrity by permitting unauthorized modification or movement, and availability by enabling file removal. The flaw is remotely exploitable over the network with low attack complexity and does not require user interaction beyond authentication. The vulnerability was publicly disclosed and patched in version 3.57.0. No known exploits are currently reported in the wild, but the high CVSS score of 8.8 reflects the significant risk posed by this vulnerability if exploited.

Potential Impact

For European organizations, this vulnerability poses a serious risk to data confidentiality, integrity, and availability, especially for those using alist to manage multi-storage environments. Attackers with valid credentials can escalate their privileges within the storage system, accessing or manipulating files belonging to other users. This can lead to data breaches, loss of critical files, disruption of business operations, and potential compliance violations under GDPR due to unauthorized data access or alteration. Organizations relying on alist for cloud or on-premises file management may face operational downtime and reputational damage if exploited. The vulnerability's network accessibility and lack of user interaction requirements increase the likelihood of exploitation in environments with weak authentication controls or insider threats.

Mitigation Recommendations

The primary mitigation is to upgrade all affected alist instances to version 3.57.0 or later, where the vulnerability has been patched. Organizations should audit their current deployments to identify vulnerable versions and apply updates promptly. Additionally, implement strict access controls and monitoring on file operation logs to detect suspicious activities indicative of traversal attacks. Employ multi-factor authentication to reduce the risk of credential compromise. Network segmentation and limiting access to alist management interfaces can reduce exposure. Conduct regular security assessments and penetration testing focused on file operation handlers to ensure no residual path traversal issues remain. Finally, educate administrators and users about the risks of path traversal vulnerabilities and the importance of timely patching.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-29T15:39:11.822Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6983a549f9fa50a62fa8d0d6

Added to database: 2/4/2026, 8:00:09 PM

Last enriched: 2/4/2026, 8:14:40 PM

Last updated: 2/4/2026, 10:17:50 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats