CVE-2026-40024
Sleuth Kit tsk_recover Path Traversal
CVSS Score
7.1
EPSS Score
0.0%
EPSS Percentile
1th
The Sleuth Kit through 4.14.0 contains a path traversal vulnerability in tsk_recover that allows an attacker to write files to arbitrary locations outside the intended recovery directory via crafted filenames or directory paths with path traversal sequences in a filesystem image. An attacker can craft a malicious filesystem image with embedded /../ sequences in filenames that, when processed by tsk_recover, writes files outside the output directory, potentially achieving code execution by overwriting shell configuration or cron entries.
| CWE | CWE-22 |
| Vendor | sleuthkit |
| Product | sleuthkit |
| Published | Apr 8, 2026 |
| Last Updated | Apr 9, 2026 |
Stay Ahead of the Next One
Get instant alerts for sleuthkit sleuthkit
Be the first to know when new high vulnerabilities affecting sleuthkit sleuthkit are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
Affected Versions
sleuthkit / sleuthkit
0 โค 4.14.0
References
Credits
Mobasi Security Team