EAP Legislator is vulnerable to Path Traversal in file extraction functionality. Attacker can prepare zipx archive (default file type used by the Legislator application) and choose arbitrary path outside the intended directory (e.x. system startup) where files will be extracted by the victim upon opening the file.
This issue was fixed in version 2.25a.
Metrics
Affected Vendors & Products
References
History
Mon, 02 Feb 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | EAP Legislator is vulnerable to Path Traversal in file extraction functionality. Attacker can prepare zipx archive (default file type used by the Legislator application) and choose arbitrary path outside the intended directory (e.x. system startup) where files will be extracted by the victim upon opening the file. This issue was fixed in version 2.25a. | |
| Title | Path Traversal in EAP Legislator | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2026-02-02T13:59:56.671Z
Reserved: 2026-01-19T13:17:10.720Z
Link: CVE-2026-1186
No data.
Status : Received
Published: 2026-02-02T14:16:34.210
Modified: 2026-02-02T14:16:34.210
Link: CVE-2026-1186
No data.
OpenCVE Enrichment
No data.