Back to VulnFeed / CVE-2026-42866
root@hackertop:~/vulnfeed/CVE-2026-42866#
CVE-2026-42866 MEDIUM Path Traversal ⚠ Unpatched · Zero-day◉ PoC 公开 Lifecycle 4/7

Alfredredbird tookie-osint up to 4.1fix modules/modules.py write_txt/write_csv/write_json/scan_file path traversal

tookie-osint 4.1fix 9d ago Impact pending confirmation
LIFECYCLE
5.1 CVSS
Vulnerability Detail Mitigation Lifecycle CVSS Assessment
Vulnerability Description
A vulnerability, which was classified as critical, has been found in Alfredredbird tookie-osint up to 4.1fix. Affected by this issue is the function write_txt/write_csv/write_json/scan_file of the file modules/modules.py. Upgrading to version 4.1fix eliminates this vulnerability.
Root Cause Analysis
Using CWE to declare the problem leads to CWE-22. The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.

Impact: Impacted is confidentiality, integrity, and availability.

Countermeasure: Upgrading to version 4.1fix eliminates this vulnerability.
Validation (PoC/EXP) - Looking for Contributors
No public PoC yet

Public validation traces already exist. Community contributors can extend them with richer reproduction content.

Contribute Your PoC/EXP
Log in to contribute PoC/EXP content. Log in
Back to VulnFeed
CVE-2026-42866 · CVSS 5.1 · Active Threat