CWE-428

Unquoted Search Path or Element

187 CVEs Avg CVSS 7.8 MITRE
1
CRITICAL
174
HIGH
11
MEDIUM
1
LOW
153
POC
0
KEV

Monthly

CVE-2026-34768 LOW PATCH GHSA Monitor

Electron's setLoginItemSettings() function on Windows fails to quote executable paths in the Run registry key, allowing local attackers with write access to ancestor directories to execute arbitrary programs at login if the app is installed to a path containing spaces. The vulnerability affects Electron versions prior to 38.8.6, 39.8.1, 40.8.0, and 41.0.0-beta.8, and requires high-privilege access and unfavorable conditions (non-standard install paths) to exploit, making real-world impact limited to non-default Windows configurations.

Microsoft Authentication Bypass
NVD GitHub
CVSS 3.1
3.9
EPSS
0.0%
CVE-2025-41359 HIGH PATCH This Week

Small HTTP Server 3.06.36 allows local attackers with low privileges to execute arbitrary code through an unquoted service path vulnerability in the http.exe service executable. By placing a malicious executable in a higher-priority directory along the unquoted path 'C:\Program Files (x86)\shttps_mg\http.exe service', attackers can achieve full system compromise with high confidentiality, integrity, and availability impact. No public exploit has been identified at time of analysis, and CISA SSVC framework indicates no current exploitation, though technical impact is rated as total.

RCE Authentication Bypass
NVD
CVSS 4.0
8.5
EPSS
0.0%
CVE-2025-41368 HIGH PATCH This Week

Small HTTP Server 3.06.36 contains an unquoted service path vulnerability (CWE-428) allowing local authenticated attackers to execute arbitrary code with elevated privileges by placing malicious executables in higher-priority directories. Despite a CVSS 4.0 score of 8.7, real-world risk is significantly lower with only 0.02% EPSS probability (4th percentile) and no public exploit identified at time of analysis. INCIBE has reported this vulnerability with patches available from the vendor.

RCE Authentication Bypass
NVD
CVSS 4.0
8.7
EPSS
0.0%
CVE-2026-33253 HIGH This Week

A remote code execution vulnerability (CVSS 8.4). High severity vulnerability requiring prompt remediation.

RCE Microsoft Windows
NVD VulDB
CVSS 4.0
8.4
EPSS
0.0%
CVE-2017-20218 HIGH POC This Week

Serviio PRO 1.8 and earlier versions contain an unquoted service path vulnerability combined with insecure directory permissions that allows local authenticated users to escalate privileges to SYSTEM level. A public exploit is available, making this vulnerability easily exploitable by any authenticated user on the system. With a CVSS score of 7.8 and multiple proof-of-concept exploits published, this represents a significant risk for organizations running affected versions.

Privilege Escalation RCE Microsoft Serviio Pro Windows
NVD Exploit-DB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-25866 HIGH This Week

Arbitrary code execution in MobaXterm prior to version 26.1 allows local attackers to hijack the application's search path when it launches Notepad++ without a fully qualified path, enabling malicious executable injection. An authenticated user can exploit this flaw by placing a crafted executable earlier in the system PATH to achieve code execution with the privileges of the MobaXterm user. No patch is currently available.

RCE
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-26033 MEDIUM This Month

Ups Multi-Ups Management Console versions up to 01.06.0001_\(a03\) contains a security vulnerability (CVSS 6.7).

RCE Ups Multi Ups Management Console
NVD
CVSS 3.0
6.7
EPSS
0.0%
CVE-2026-1585 MEDIUM This Month

Unquoted service path handling in IJ Scan Utility versions 1.1.2 through 1.5.0 on Windows allows privileged local attackers to achieve arbitrary code execution by placing a malicious executable in a predictable directory location. An authenticated user with high privileges could exploit this weakness to execute commands with the same permissions as the vulnerable service. No patch is currently available for this issue.

Windows
NVD
CVSS 3.1
6.7
EPSS
0.0%
CVE-2019-25345 HIGH POC This Week

Realtek IIS Codec Service 6.4.10041.133 contains an unquoted service path vulnerability that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted path in the service configuration to inject malicious executables and escalate privileges on the system. [CVSS 7.8 HIGH]

Iis
NVD Exploit-DB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2019-25310 HIGH POC This Week

ActiveFaxServiceNT service contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).

RCE
NVD Exploit-DB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-34768
EPSS 0% CVSS 3.9
LOW PATCH Monitor

Electron's setLoginItemSettings() function on Windows fails to quote executable paths in the Run registry key, allowing local attackers with write access to ancestor directories to execute arbitrary programs at login if the app is installed to a path containing spaces. The vulnerability affects Electron versions prior to 38.8.6, 39.8.1, 40.8.0, and 41.0.0-beta.8, and requires high-privilege access and unfavorable conditions (non-standard install paths) to exploit, making real-world impact limited to non-default Windows configurations.

Microsoft Authentication Bypass
NVD GitHub
CVE-2025-41359
EPSS 0% CVSS 8.5
HIGH PATCH This Week

Small HTTP Server 3.06.36 allows local attackers with low privileges to execute arbitrary code through an unquoted service path vulnerability in the http.exe service executable. By placing a malicious executable in a higher-priority directory along the unquoted path 'C:\Program Files (x86)\shttps_mg\http.exe service', attackers can achieve full system compromise with high confidentiality, integrity, and availability impact. No public exploit has been identified at time of analysis, and CISA SSVC framework indicates no current exploitation, though technical impact is rated as total.

RCE Authentication Bypass
NVD
CVE-2025-41368
EPSS 0% CVSS 8.7
HIGH PATCH This Week

Small HTTP Server 3.06.36 contains an unquoted service path vulnerability (CWE-428) allowing local authenticated attackers to execute arbitrary code with elevated privileges by placing malicious executables in higher-priority directories. Despite a CVSS 4.0 score of 8.7, real-world risk is significantly lower with only 0.02% EPSS probability (4th percentile) and no public exploit identified at time of analysis. INCIBE has reported this vulnerability with patches available from the vendor.

RCE Authentication Bypass
NVD
CVE-2026-33253
EPSS 0% CVSS 8.4
HIGH This Week

A remote code execution vulnerability (CVSS 8.4). High severity vulnerability requiring prompt remediation.

RCE Microsoft Windows
NVD VulDB
CVE-2017-20218
EPSS 0% CVSS 7.8
HIGH POC This Week

Serviio PRO 1.8 and earlier versions contain an unquoted service path vulnerability combined with insecure directory permissions that allows local authenticated users to escalate privileges to SYSTEM level. A public exploit is available, making this vulnerability easily exploitable by any authenticated user on the system. With a CVSS score of 7.8 and multiple proof-of-concept exploits published, this represents a significant risk for organizations running affected versions.

Privilege Escalation RCE Microsoft +2
NVD Exploit-DB
CVE-2026-25866
EPSS 0% CVSS 7.8
HIGH This Week

Arbitrary code execution in MobaXterm prior to version 26.1 allows local attackers to hijack the application's search path when it launches Notepad++ without a fully qualified path, enabling malicious executable injection. An authenticated user can exploit this flaw by placing a crafted executable earlier in the system PATH to achieve code execution with the privileges of the MobaXterm user. No patch is currently available.

RCE
NVD
CVE-2026-26033
EPSS 0% CVSS 6.7
MEDIUM This Month

Ups Multi-Ups Management Console versions up to 01.06.0001_\(a03\) contains a security vulnerability (CVSS 6.7).

RCE Ups Multi Ups Management Console
NVD
CVE-2026-1585
EPSS 0% CVSS 6.7
MEDIUM This Month

Unquoted service path handling in IJ Scan Utility versions 1.1.2 through 1.5.0 on Windows allows privileged local attackers to achieve arbitrary code execution by placing a malicious executable in a predictable directory location. An authenticated user with high privileges could exploit this weakness to execute commands with the same permissions as the vulnerable service. No patch is currently available for this issue.

Windows
NVD
CVE-2019-25345
EPSS 0% CVSS 7.8
HIGH POC This Week

Realtek IIS Codec Service 6.4.10041.133 contains an unquoted service path vulnerability that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted path in the service configuration to inject malicious executables and escalate privileges on the system. [CVSS 7.8 HIGH]

Iis
NVD Exploit-DB
CVE-2019-25310
EPSS 0% CVSS 7.8
HIGH POC This Week

ActiveFaxServiceNT service contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).

RCE
NVD Exploit-DB

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy