FKIE_CVE-2026-26959
Vulnerability from fkie_nvd - Published: 2026-02-20 00:16 - Updated: 2026-02-20 13:49
Severity ?
Summary
ADB Explorer is a fluent UI for ADB on Windows. Versions 0.9.26020 and below fail to validate the integrity or authenticity of the ADB binary path specified in the ManualAdbPath setting before executing it, allowing arbitrary code execution with the privileges of the current user. An attacker can exploit this by crafting a malicious App.txt settings file that points ManualAdbPath to an arbitrary executable, then convincing a victim to launch the application with a command-line argument directing it to the malicious configuration directory. This vulnerability could be leveraged through social engineering tactics, such as distributing a shortcut bundled with a crafted settings file in an archive, resulting in RCE upon application startup. Thus issue has been fixed in version 0.9.26021.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ADB Explorer is a fluent UI for ADB on Windows. Versions 0.9.26020 and below fail to validate the integrity or authenticity of the ADB binary path specified in the ManualAdbPath setting before executing it, allowing arbitrary code execution with the privileges of the current user. An attacker can exploit this by crafting a malicious App.txt settings file that points ManualAdbPath to an arbitrary executable, then convincing a victim to launch the application with a command-line argument directing it to the malicious configuration directory. This vulnerability could be leveraged through social engineering tactics, such as distributing a shortcut bundled with a crafted settings file in an archive, resulting in RCE upon application startup. Thus issue has been fixed in version 0.9.26021."
},
{
"lang": "es",
"value": "ADB Explorer es una interfaz de usuario fluida para ADB en Windows. Las versiones 0.9.26020 e inferiores no validan la integridad o autenticidad de la ruta del binario de ADB especificada en la configuraci\u00f3n ManualAdbPath antes de ejecutarlo, lo que permite la ejecuci\u00f3n de c\u00f3digo arbitrario con los privilegios del usuario actual. Un atacante puede explotar esto creando un archivo de configuraci\u00f3n App.txt malicioso que apunte ManualAdbPath a un ejecutable arbitrario, y luego convenciendo a una v\u00edctima para que inicie la aplicaci\u00f3n con un argumento de l\u00ednea de comandos que la dirija al directorio de configuraci\u00f3n malicioso. Esta vulnerabilidad podr\u00eda ser aprovechada mediante t\u00e1cticas de ingenier\u00eda social, como la distribuci\u00f3n de un acceso directo empaquetado con un archivo de configuraci\u00f3n manipulado en un archivo comprimido, lo que resultar\u00eda en RCE al iniciar la aplicaci\u00f3n. Este problema ha sido solucionado en la versi\u00f3n 0.9.26021."
}
],
"id": "CVE-2026-26959",
"lastModified": "2026-02-20T13:49:47.623",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2026-02-20T00:16:16.000",
"references": [
{
"source": "security-advisories@github.com",
"url": "https://github.com/Alex4SSB/ADB-Explorer/commit/1b9fed20e875f5e74fd04e9889402f969c2d34e4"
},
{
"source": "security-advisories@github.com",
"url": "https://github.com/Alex4SSB/ADB-Explorer/releases/tag/v0.9.26021"
},
{
"source": "security-advisories@github.com",
"url": "https://github.com/Alex4SSB/ADB-Explorer/security/advisories/GHSA-gcgv-2jq7-74rp"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-829"
}
],
"source": "security-advisories@github.com",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…