๐Ÿ” CVE Alert

CVE-2026-40024

HIGH 7.1

Sleuth Kit tsk_recover Path Traversal

CVSS Score
7.1
EPSS Score
0.0%
EPSS Percentile
1th

The Sleuth Kit through 4.14.0 contains a path traversal vulnerability in tsk_recover that allows an attacker to write files to arbitrary locations outside the intended recovery directory via crafted filenames or directory paths with path traversal sequences in a filesystem image. An attacker can craft a malicious filesystem image with embedded /../ sequences in filenames that, when processed by tsk_recover, writes files outside the output directory, potentially achieving code execution by overwriting shell configuration or cron entries.

CWE CWE-22
Vendor sleuthkit
Product sleuthkit
Published Apr 8, 2026
Last Updated Apr 9, 2026
Stay Ahead of the Next One

Get instant alerts for sleuthkit sleuthkit

Be the first to know when new high vulnerabilities affecting sleuthkit sleuthkit are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None

Affected Versions

sleuthkit / sleuthkit
0 โ‰ค 4.14.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/sleuthkit/sleuthkit/commit/a3f96b3bc36a8bb1a00c297f77110d4a6e7dd31b mobasi.ai: https://mobasi.ai/sentinel vulncheck.com: https://www.vulncheck.com/advisories/sleuth-kit-tsk-recover-path-traversal

Credits

Mobasi Security Team