๐Ÿ” CVE Alert

CVE-2026-39973

HIGH 7.1

Apktool: Path Traversal to Arbitrary File Write

CVSS Score
7.1
EPSS Score
0.0%
EPSS Percentile
0th

Apktool is a tool for reverse engineering Android APK files. In versions 3.0.0 and 3.0.1, a path traversal vulnerability in `brut/androlib/res/decoder/ResFileDecoder.java` allows a maliciously crafted APK to write arbitrary files to the filesystem during standard decoding (`apktool d`). This is a security regression introduced in commit e10a045 (PR #4041, December 12, 2025), which removed the `BrutIO.sanitizePath()` call that previously prevented path traversal in resource file output paths. An attacker can embed `../` sequences in the `resources.arsc` Type String Pool to escape the output directory and write files to arbitrary locations, including `~/.ssh/config`, `~/.bashrc`, or Windows Startup folders, escalating to RCE. The fix in version 3.0.2 re-introduces `BrutIO.sanitizePath()` in `ResFileDecoder.java` before file write operations.

CWE CWE-22
Vendor ibotpeaches
Product apktool
Published Apr 21, 2026
Stay Ahead of the Next One

Get instant alerts for ibotpeaches apktool

Be the first to know when new high vulnerabilities affecting ibotpeaches apktool are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None

Affected Versions

iBotPeaches / Apktool
>= 3.0.0, < 3.0.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/iBotPeaches/Apktool/security/advisories/GHSA-m8mh-x359-vm8m github.com: https://github.com/iBotPeaches/Apktool/pull/4041 github.com: https://github.com/iBotPeaches/Apktool/commit/e10a0450c7afcd9462c0b76bcbff0e7428b92bdd#diff-cd531ebe1014bfd18185bf21585ca5cdb16fbcb07703ebc47949a1b4e4e36bc3 github.com: https://github.com/iBotPeaches/Apktool/releases/tag/v3.0.2