Information Disclosure
Windows 10 Version 1607
Windows 10 Version 1809
Windows 10 Version 21H2
Windows 10 Version 22H2
Windows 11 Version 22H3
Windows 11 Version 23H2
Windows 11 Version 24H2
Windows 11 Version 25H2
Windows 11 Version 26H1
Windows Server 2012
Windows Server 2012 Server Core Installation
Windows Server 2012 R2
Windows Server 2012 R2 Server Core Installation
Windows Server 2016
Windows Server 2016 Server Core Installation
Windows Server 2019
Windows Server 2019 Server Core Installation
Windows Server 2022
Windows Server 2022 23H2 Edition Server Core Installation
Windows Server 2025
Windows Server 2025 Server Core Installation
5.5
CVSS 3.1
Temporal: 4.8
Share
CVSS VectorNVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Lifecycle Timeline
1
Analysis Generated
Apr 14, 2026 - 19:42 vuln.today
DescriptionNVD
Improper link resolution before file access ('link following') in Universal Plug and Play (upnp.dll) allows an authorized attacker to disclose information locally.
AnalysisAI
Improper link resolution in Windows UPnP (upnp.dll) allows authenticated local attackers to disclose sensitive information through symlink following. The vulnerability affects Windows 10 versions 1607-22H2, Windows 11 versions 22H3-26H1, and Windows Server 2012-2025. …
Sign in for full analysis, threat intelligence, and remediation guidance.
Share
External POC / Exploit Code
Leaving vuln.today
Destination URL
POC code from unknown sources may be malicious, contain backdoors, or be fake.
Always review and test exploit code in a safe, isolated environment (VM/sandbox).
Verify the source reputation and cross-reference with known databases (Exploit-DB, GitHub Security).
EUVD-2026-22593
GHSA-w3xc-48m6-6x2m