Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27115: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Alex4SSB ADB-Explorer

0
High
VulnerabilityCVE-2026-27115cvecve-2026-27115cwe-22cwe-73
Published: Fri Feb 20 2026 (02/20/2026, 17:07:48 UTC)
Source: CVE Database V5
Vendor/Project: Alex4SSB
Product: ADB-Explorer

Description

ADB Explorer is a fluent UI for ADB on Windows. Versions 0.9.26020 and below have an unvalidated command-line argument that allows any user to trigger recursive deletion of arbitrary directories on the Windows filesystem. ADB Explorer accepts an optional path argument to set a custom data directory, but only check whether the path exists. The ClearDrag() method calls Directory.Delete(dir, true) on every subdirectory of that path at both application startup and exit. An attacker can craft a malicious shortcut (.lnk) or batch script that launches ADB Explorer with a critical directory (e.g. C:\Users\%USERNAME%\Documents) as the argument, causing permanent recursive deletion of all its subdirectories. Any user who launches ADB Explorer via a crafted shortcut, batch file, or script loses the contents of the targeted directory permanently (deletion bypasses the Recycle Bin). This issue has been fixed in version 0.9.26021.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 14:27:57 UTC

Technical Analysis

CVE-2026-27115 is a path traversal vulnerability categorized under CWE-22 and CWE-73 affecting Alex4SSB's ADB Explorer, a Windows-based fluent UI for ADB. Versions 0.9.26020 and earlier improperly handle an optional command-line argument that specifies a custom data directory. The application only verifies the existence of the provided path but does not validate or sanitize it to restrict it within a safe directory boundary. The ClearDrag() method recursively deletes all subdirectories within the specified directory by calling Directory.Delete(dir, true) during application startup and exit. An attacker can exploit this by crafting a malicious shortcut (.lnk) or batch script that launches ADB Explorer with a critical system or user directory (e.g., C:\Users\%USERNAME%\Documents) as the argument. When a user runs this crafted shortcut, the application recursively deletes all subdirectories under the targeted directory, permanently removing data without sending it to the Recycle Bin. This vulnerability requires user interaction but no elevated privileges or authentication. The flaw can lead to significant data loss and disruption of user or system operations. The vendor has addressed this issue in version 0.9.26021 by presumably adding proper validation or restricting directory deletion scope. No known exploits have been reported in the wild as of the publication date.

Potential Impact

The primary impact of this vulnerability is the permanent loss of data due to recursive deletion of arbitrary directories on affected Windows systems. This affects data integrity and availability severely, as critical user or system files can be deleted without recovery options like the Recycle Bin. Organizations relying on ADB Explorer for Android device management on Windows may face operational disruptions, loss of important documents, or configuration files if users inadvertently execute malicious shortcuts or scripts. The attack vector requires user interaction, limiting remote exploitation but increasing risk from social engineering or insider threats. The lack of privilege requirements means any user on the system can be targeted, potentially leading to widespread data loss on shared machines. Although confidentiality is not directly impacted, the destruction of data can cause significant business continuity issues, loss of productivity, and potential compliance violations if critical data is destroyed. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially in environments where ADB Explorer is widely deployed.

Mitigation Recommendations

1. Immediately update ADB Explorer to version 0.9.26021 or later, where the vulnerability is fixed. 2. Educate users to avoid launching ADB Explorer via untrusted shortcuts, batch files, or scripts, especially those received from unknown or unverified sources. 3. Implement application whitelisting and restrict execution of unauthorized scripts or shortcuts that invoke ADB Explorer. 4. Use endpoint protection solutions to detect and block suspicious file deletions or abnormal process behaviors related to ADB Explorer. 5. Regularly back up critical user and system data to enable recovery in case of accidental or malicious deletion. 6. Employ Windows file system permissions to limit user ability to delete critical directories or subdirectories where feasible. 7. Monitor logs for unusual ADB Explorer startup or exit events that may indicate exploitation attempts. 8. Consider sandboxing or running ADB Explorer with least privilege to reduce potential damage scope. These steps go beyond generic advice by focusing on user behavior, execution control, and proactive detection tailored to this specific deletion vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-17T18:42:27.043Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699899fe2c4d84f260b6810c

Added to database: 2/20/2026, 5:29:34 PM

Last enriched: 2/28/2026, 2:27:57 PM

Last updated: 4/6/2026, 6:38:58 AM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses