EAP Legislator is vulnerable to Path Traversal in file extraction functionality. Attacker can prepare zipx archive (default file type used by the Legislator application) and choose arbitrary path outside the intended directory (e.x. system startup) where files will be extracted by the victim upon opening the file.
This issue was fixed in version 2.25a.
Metrics
Affected Vendors & Products
References
History
Wed, 04 Feb 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Abc Pro
Abc Pro eap Legislator |
|
| Vendors & Products |
Abc Pro
Abc Pro eap Legislator |
Mon, 02 Feb 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 02 Feb 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | EAP Legislator is vulnerable to Path Traversal in file extraction functionality. Attacker can prepare zipx archive (default file type used by the Legislator application) and choose arbitrary path outside the intended directory (e.x. system startup) where files will be extracted by the victim upon opening the file. This issue was fixed in version 2.25a. | |
| Title | Path Traversal in EAP Legislator | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2026-02-02T17:32:58.563Z
Reserved: 2026-01-19T13:17:10.720Z
Link: CVE-2026-1186
Updated: 2026-02-02T17:32:49.044Z
Status : Awaiting Analysis
Published: 2026-02-02T14:16:34.210
Modified: 2026-02-03T16:44:36.630
Link: CVE-2026-1186
No data.