CVE-2026-27115: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Alex4SSB ADB-Explorer
ADB Explorer is a fluent UI for ADB on Windows. Versions 0.9.26020 and below have an unvalidated command-line argument that allows any user to trigger recursive deletion of arbitrary directories on the Windows filesystem. ADB Explorer accepts an optional path argument to set a custom data directory, but only check whether the path exists. The ClearDrag() method calls Directory.Delete(dir, true) on every subdirectory of that path at both application startup and exit. An attacker can craft a malicious shortcut (.lnk) or batch script that launches ADB Explorer with a critical directory (e.g. C:\Users\%USERNAME%\Documents) as the argument, causing permanent recursive deletion of all its subdirectories. Any user who launches ADB Explorer via a crafted shortcut, batch file, or script loses the contents of the targeted directory permanently (deletion bypasses the Recycle Bin). This issue has been fixed in version 0.9.26021.
AI Analysis
Technical Summary
CVE-2026-27115 is a path traversal vulnerability classified under CWE-22 and CWE-73 affecting Alex4SSB's ADB-Explorer, a Windows-based fluent UI for Android Debug Bridge (ADB). Versions 0.9.26020 and earlier improperly validate an optional command-line argument that specifies a custom data directory. The application only verifies the existence of the directory path but does not sanitize or restrict it, allowing an attacker to specify any directory on the Windows filesystem. The ClearDrag() method recursively deletes all subdirectories within the specified path at both application startup and exit by invoking Directory.Delete(dir, true). An attacker can exploit this by crafting a malicious shortcut (.lnk) or batch script that launches ADB-Explorer with a critical system or user directory (e.g., C:\Users\%USERNAME%\Documents) as the argument. When a user executes this shortcut or script, the application recursively deletes all subdirectories within the targeted directory, bypassing the Recycle Bin and causing irreversible data loss. The vulnerability requires local user interaction to trigger but does not require elevated privileges or authentication. No known exploits are reported in the wild as of publication. The issue was resolved in version 0.9.26021 by implementing proper validation and restrictions on the path argument to prevent arbitrary directory deletion.
Potential Impact
This vulnerability can lead to severe data loss and disruption for affected users. Organizations relying on ADB-Explorer for Android development or device management on Windows systems risk permanent deletion of critical user or system data if a malicious shortcut or script is executed. The impact includes loss of important documents, configuration files, and potentially system instability if system directories are targeted. Since the deletion bypasses the Recycle Bin, recovery is difficult without backups. This can result in operational downtime, loss of productivity, and potential financial costs associated with data recovery efforts. Although exploitation requires local user interaction, social engineering or insider threats could facilitate triggering the vulnerability. The integrity and availability of data are directly compromised, but confidentiality is not affected. The vulnerability poses a significant risk especially in environments where users frequently run third-party scripts or shortcuts without verification.
Mitigation Recommendations
The primary mitigation is to upgrade ADB-Explorer to version 0.9.26021 or later, where the vulnerability is fixed. Until upgrading, organizations should implement strict controls on execution of shortcuts and scripts, especially those that launch ADB-Explorer with command-line arguments. Employ application whitelisting and restrict user permissions to prevent unauthorized creation or execution of malicious shortcuts. Educate users about the risks of running untrusted scripts or shortcuts. Implement endpoint detection and response (EDR) solutions to monitor for suspicious deletion activities initiated by ADB-Explorer. Regularly back up important data and verify backup integrity to enable recovery from accidental or malicious deletions. Additionally, consider sandboxing or running ADB-Explorer in a controlled environment to limit filesystem access. Review and audit usage of ADB-Explorer in organizational environments to identify and remediate vulnerable installations.
Affected Countries
United States, Germany, India, China, United Kingdom, Canada, Australia, Japan, South Korea, France
CVE-2026-27115: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Alex4SSB ADB-Explorer
Description
ADB Explorer is a fluent UI for ADB on Windows. Versions 0.9.26020 and below have an unvalidated command-line argument that allows any user to trigger recursive deletion of arbitrary directories on the Windows filesystem. ADB Explorer accepts an optional path argument to set a custom data directory, but only check whether the path exists. The ClearDrag() method calls Directory.Delete(dir, true) on every subdirectory of that path at both application startup and exit. An attacker can craft a malicious shortcut (.lnk) or batch script that launches ADB Explorer with a critical directory (e.g. C:\Users\%USERNAME%\Documents) as the argument, causing permanent recursive deletion of all its subdirectories. Any user who launches ADB Explorer via a crafted shortcut, batch file, or script loses the contents of the targeted directory permanently (deletion bypasses the Recycle Bin). This issue has been fixed in version 0.9.26021.
AI-Powered Analysis
Technical Analysis
CVE-2026-27115 is a path traversal vulnerability classified under CWE-22 and CWE-73 affecting Alex4SSB's ADB-Explorer, a Windows-based fluent UI for Android Debug Bridge (ADB). Versions 0.9.26020 and earlier improperly validate an optional command-line argument that specifies a custom data directory. The application only verifies the existence of the directory path but does not sanitize or restrict it, allowing an attacker to specify any directory on the Windows filesystem. The ClearDrag() method recursively deletes all subdirectories within the specified path at both application startup and exit by invoking Directory.Delete(dir, true). An attacker can exploit this by crafting a malicious shortcut (.lnk) or batch script that launches ADB-Explorer with a critical system or user directory (e.g., C:\Users\%USERNAME%\Documents) as the argument. When a user executes this shortcut or script, the application recursively deletes all subdirectories within the targeted directory, bypassing the Recycle Bin and causing irreversible data loss. The vulnerability requires local user interaction to trigger but does not require elevated privileges or authentication. No known exploits are reported in the wild as of publication. The issue was resolved in version 0.9.26021 by implementing proper validation and restrictions on the path argument to prevent arbitrary directory deletion.
Potential Impact
This vulnerability can lead to severe data loss and disruption for affected users. Organizations relying on ADB-Explorer for Android development or device management on Windows systems risk permanent deletion of critical user or system data if a malicious shortcut or script is executed. The impact includes loss of important documents, configuration files, and potentially system instability if system directories are targeted. Since the deletion bypasses the Recycle Bin, recovery is difficult without backups. This can result in operational downtime, loss of productivity, and potential financial costs associated with data recovery efforts. Although exploitation requires local user interaction, social engineering or insider threats could facilitate triggering the vulnerability. The integrity and availability of data are directly compromised, but confidentiality is not affected. The vulnerability poses a significant risk especially in environments where users frequently run third-party scripts or shortcuts without verification.
Mitigation Recommendations
The primary mitigation is to upgrade ADB-Explorer to version 0.9.26021 or later, where the vulnerability is fixed. Until upgrading, organizations should implement strict controls on execution of shortcuts and scripts, especially those that launch ADB-Explorer with command-line arguments. Employ application whitelisting and restrict user permissions to prevent unauthorized creation or execution of malicious shortcuts. Educate users about the risks of running untrusted scripts or shortcuts. Implement endpoint detection and response (EDR) solutions to monitor for suspicious deletion activities initiated by ADB-Explorer. Regularly back up important data and verify backup integrity to enable recovery from accidental or malicious deletions. Additionally, consider sandboxing or running ADB-Explorer in a controlled environment to limit filesystem access. Review and audit usage of ADB-Explorer in organizational environments to identify and remediate vulnerable installations.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-17T18:42:27.043Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699899fe2c4d84f260b6810c
Added to database: 2/20/2026, 5:29:34 PM
Last enriched: 2/20/2026, 5:43:49 PM
Last updated: 2/20/2026, 8:57:05 PM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2847: OS Command Injection in UTT HiPER 520
HighCVE-2026-2846: OS Command Injection in UTT HiPER 520
HighCVE-2025-67438: n/a
UnknownCVE-2026-27072: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in PixelYourSite PixelYourSite – Your smart PIXEL (TAG) Manager
UnknownCVE-2026-24956: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Shahjada Download Manager Addons for Elementor
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.