Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series

0
High
VulnerabilityCVE-2026-25191cvecve-2026-25191
Published: Thu Feb 26 2026 (02/26/2026, 05:39:24 UTC)
Source: CVE Database V5
Vendor/Project: Digital Arts Inc.
Product: FinalCode Ver.5 series

Description

The installer of FinalCode Client provided by Digital Arts Inc. contains an issue with the DLL search path. If a user is directed to place a malicious DLL file and the installer to the same directory and execute the installer, arbitrary code may be executed with the installer's execution privilege.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/05/2026, 11:39:35 UTC

Technical Analysis

The vulnerability identified as CVE-2026-25191 affects the installer component of Digital Arts Inc.'s FinalCode Ver.5 series, specifically versions prior to 5.43R01. The root cause is an uncontrolled search path element vulnerability related to DLL loading during the installation process. When the installer executes, it searches for required DLLs in its current directory without sufficient validation or path restrictions. An attacker with local access can place a malicious DLL file in the same directory as the installer executable. If a user then runs the installer from that directory, the malicious DLL is loaded instead of the legitimate one, resulting in arbitrary code execution with the installer's execution privileges. This can lead to full compromise of the affected system, including unauthorized data access, modification, or disruption of services. The CVSS v3.0 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with attack vector local, low attack complexity, no privileges required, but user interaction necessary. Although no exploits are currently known in the wild, the vulnerability poses a significant risk, especially in environments where users may run installers from untrusted or shared directories. The vulnerability highlights the importance of secure DLL search path handling and the risks of executing installers from directories writable by untrusted users.

Potential Impact

The potential impact of CVE-2026-25191 is substantial for organizations using affected versions of FinalCode Ver.5. Successful exploitation allows arbitrary code execution with the installer's privileges, which could be elevated depending on the context. This can lead to unauthorized disclosure of sensitive data, modification or deletion of critical files, installation of persistent malware, or disruption of business operations. Since the vulnerability requires local access and user interaction, the threat is particularly relevant in environments where users may download installers to shared or user-writable directories, such as corporate endpoints, development environments, or remote workstations. Attackers could leverage social engineering to trick users into executing the compromised installer. The compromise of systems running FinalCode could undermine data protection and encryption workflows, impacting organizations relying on this software for secure file handling. Overall, the vulnerability could facilitate lateral movement, privilege escalation, and data breaches if exploited.

Mitigation Recommendations

To mitigate CVE-2026-25191, organizations should immediately upgrade FinalCode Ver.5 to version 5.43R01 or later, where the vulnerability is addressed. Until patching is possible, enforce strict controls on the directories from which installers are executed, ensuring they are not writable by untrusted users to prevent placement of malicious DLLs. Educate users to avoid running installers from untrusted or shared directories and to verify the integrity and source of installation files. Implement application whitelisting and endpoint protection solutions that can detect or block unauthorized DLL loading or suspicious installer behavior. Use least privilege principles to limit the installer's execution context where feasible. Additionally, monitor systems for unusual activity following installation attempts and maintain robust incident response plans to quickly address potential compromises. Vendors and administrators should also review and harden DLL search path handling in software deployment processes to prevent similar vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
jpcert
Date Reserved
2026-02-12T07:13:34.985Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 699fe090b7ef31ef0bbb51b8

Added to database: 2/26/2026, 5:56:32 AM

Last enriched: 3/5/2026, 11:39:35 AM

Last updated: 4/12/2026, 3:44:21 PM

Views: 91

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses