A relative path traversal vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to read the contents of unexpected files or system data.
We have already fixed the vulnerability in the following version:
Qsync Central 5.0.0.4 ( 2026/01/20 ) and later
References
| Link | Resource |
|---|---|
| https://www.qnap.com/en/security-advisory/qsa-26-02 | Vendor Advisory |
Configurations
History
12 Feb 2026, 14:40
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.qnap.com/en/security-advisory/qsa-26-02 - Vendor Advisory | |
| CPE | cpe:2.3:a:qnap:qsync_central:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
| First Time |
Qnap qsync Central
Qnap |
11 Feb 2026, 13:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-11 13:15
Updated : 2026-02-12 14:40
NVD link : CVE-2025-58467
Mitre link : CVE-2025-58467
CVE.ORG link : CVE-2025-58467
JSON object : View
Products Affected
qnap
- qsync_central
CWE
CWE-23
Relative Path Traversal
