← Back to CVEs
CVE-2026-25161
HIGH8.8
Description
Alist is a file list program that supports multiple storages, powered by Gin and Solidjs. Prior to version 3.57.0, the application contains path traversal vulnerability in multiple file operation handlers. An authenticated attacker can bypass directory-level authorisation by injecting traversal sequences into filename components, enabling unauthorised file removal, movement and copying across user boundaries within the same storage mount. This issue has been patched in version 3.57.0.
CVE Details
CVSS v3.1 Score8.8
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published2/4/2026
Last Modified2/13/2026
Sourcenvd
Honeypot Sightings0
Affected Products
alistgo:alist
Weaknesses (CWE)
CWE-22
References
https://github.com/AlistGo/alist/commit/b188288525b9a35c76535139311e7c036dab057e(security-advisories@github.com)
https://github.com/AlistGo/alist/security/advisories/GHSA-x4q4-7phh-42j9(security-advisories@github.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.