CVE-2026-26228

Low
|2.3
No Exploit

Plain English Summary

AI-powered analysis for quick understanding

An attacker who is authenticated and has network access to the Remote Access Server can exploit this vulnerability to access files outside the intended download directory on the VLC app for Android. However, their access is limited to the app's internal storage and specific external storage areas due to Android's security restrictions.

Technical Description

VideoLAN VLC for Android prior to version 3.7.0 contains a path traversal vulnerability in the Remote Access Server routing for the authenticated endpoint GET /download. The file query parameter is concatenated into a filesystem path under the configured download directory without canonicalization or directory containment checks, allowing an authenticated attacker with network reachability to the Remote Access Server to request files outside the intended directory. The impact is bounded by the Android application sandbox and storage restrictions, typically limiting exposure to app-internal and app-specific external storage.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeChanged

Vector String

CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$332($100-$500)
Vendor Response
Grade APatched in 1 day

Quick Information

Published

Feb 26, 2026

about 1 month ago

Last Modified

Feb 27, 2026

about 1 month ago