Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27115: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Alex4SSB ADB-Explorer

0
High
VulnerabilityCVE-2026-27115cvecve-2026-27115cwe-22cwe-73
Published: Fri Feb 20 2026 (02/20/2026, 17:07:48 UTC)
Source: CVE Database V5
Vendor/Project: Alex4SSB
Product: ADB-Explorer

Description

ADB Explorer is a fluent UI for ADB on Windows. Versions 0.9.26020 and below have an unvalidated command-line argument that allows any user to trigger recursive deletion of arbitrary directories on the Windows filesystem. ADB Explorer accepts an optional path argument to set a custom data directory, but only check whether the path exists. The ClearDrag() method calls Directory.Delete(dir, true) on every subdirectory of that path at both application startup and exit. An attacker can craft a malicious shortcut (.lnk) or batch script that launches ADB Explorer with a critical directory (e.g. C:\Users\%USERNAME%\Documents) as the argument, causing permanent recursive deletion of all its subdirectories. Any user who launches ADB Explorer via a crafted shortcut, batch file, or script loses the contents of the targeted directory permanently (deletion bypasses the Recycle Bin). This issue has been fixed in version 0.9.26021.

AI-Powered Analysis

AILast updated: 02/20/2026, 17:43:49 UTC

Technical Analysis

CVE-2026-27115 is a path traversal vulnerability classified under CWE-22 and CWE-73 affecting Alex4SSB's ADB-Explorer, a Windows-based fluent UI for Android Debug Bridge (ADB). Versions 0.9.26020 and earlier improperly validate an optional command-line argument that specifies a custom data directory. The application only verifies the existence of the directory path but does not sanitize or restrict it, allowing an attacker to specify any directory on the Windows filesystem. The ClearDrag() method recursively deletes all subdirectories within the specified path at both application startup and exit by invoking Directory.Delete(dir, true). An attacker can exploit this by crafting a malicious shortcut (.lnk) or batch script that launches ADB-Explorer with a critical system or user directory (e.g., C:\Users\%USERNAME%\Documents) as the argument. When a user executes this shortcut or script, the application recursively deletes all subdirectories within the targeted directory, bypassing the Recycle Bin and causing irreversible data loss. The vulnerability requires local user interaction to trigger but does not require elevated privileges or authentication. No known exploits are reported in the wild as of publication. The issue was resolved in version 0.9.26021 by implementing proper validation and restrictions on the path argument to prevent arbitrary directory deletion.

Potential Impact

This vulnerability can lead to severe data loss and disruption for affected users. Organizations relying on ADB-Explorer for Android development or device management on Windows systems risk permanent deletion of critical user or system data if a malicious shortcut or script is executed. The impact includes loss of important documents, configuration files, and potentially system instability if system directories are targeted. Since the deletion bypasses the Recycle Bin, recovery is difficult without backups. This can result in operational downtime, loss of productivity, and potential financial costs associated with data recovery efforts. Although exploitation requires local user interaction, social engineering or insider threats could facilitate triggering the vulnerability. The integrity and availability of data are directly compromised, but confidentiality is not affected. The vulnerability poses a significant risk especially in environments where users frequently run third-party scripts or shortcuts without verification.

Mitigation Recommendations

The primary mitigation is to upgrade ADB-Explorer to version 0.9.26021 or later, where the vulnerability is fixed. Until upgrading, organizations should implement strict controls on execution of shortcuts and scripts, especially those that launch ADB-Explorer with command-line arguments. Employ application whitelisting and restrict user permissions to prevent unauthorized creation or execution of malicious shortcuts. Educate users about the risks of running untrusted scripts or shortcuts. Implement endpoint detection and response (EDR) solutions to monitor for suspicious deletion activities initiated by ADB-Explorer. Regularly back up important data and verify backup integrity to enable recovery from accidental or malicious deletions. Additionally, consider sandboxing or running ADB-Explorer in a controlled environment to limit filesystem access. Review and audit usage of ADB-Explorer in organizational environments to identify and remediate vulnerable installations.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-17T18:42:27.043Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699899fe2c4d84f260b6810c

Added to database: 2/20/2026, 5:29:34 PM

Last enriched: 2/20/2026, 5:43:49 PM

Last updated: 2/20/2026, 8:57:05 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats