The Sleuth Kit through 4.14.0 contains a path traversal vulnerability in tsk_recover that allows an attacker to write files to arbitrary locations outside the intended recovery directory via crafted filenames or directory paths with path traversal sequences in a filesystem image. An attacker can craft a malicious filesystem image with embedded /../ sequences in filenames that, when processed by tsk_recover, writes files outside the output directory, potentially achieving code execution by overwriting shell configuration or cron entries.
References
| Link | Resource |
|---|---|
| https://github.com/sleuthkit/sleuthkit/commit/a3f96b3bc36a8bb1a00c297f77110d4a6e7dd31b | Patch |
| https://mobasi.ai/sentinel | Third Party Advisory |
| https://www.vulncheck.com/advisories/sleuth-kit-tsk-recover-path-traversal | Third Party Advisory |
Configurations
History
13 Apr 2026, 20:28
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Sleuthkit
Sleuthkit the Sleuth Kit |
|
| References | () https://github.com/sleuthkit/sleuthkit/commit/a3f96b3bc36a8bb1a00c297f77110d4a6e7dd31b - Patch | |
| References | () https://mobasi.ai/sentinel - Third Party Advisory | |
| References | () https://www.vulncheck.com/advisories/sleuth-kit-tsk-recover-path-traversal - Third Party Advisory | |
| CPE | cpe:2.3:a:sleuthkit:the_sleuth_kit:*:*:*:*:*:*:*:* |
08 Apr 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-08 22:16
Updated : 2026-04-15 20:52
NVD link : CVE-2026-40024
Mitre link : CVE-2026-40024
CVE.ORG link : CVE-2026-40024
JSON object : View
Products Affected
sleuthkit
- the_sleuth_kit
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
