Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 07 Apr 2026 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Stackfield Desktop App Path Traversal Leading to Arbitrary File Write |
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Stackfield
Stackfield desktop App |
|
| Vendors & Products |
Stackfield
Stackfield desktop App |
Fri, 03 Apr 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-22 | |
| Metrics |
cvssV3_1
|
Fri, 03 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Stackfield Desktop App before 1.10.2 for macOS and Windows contains a path traversal vulnerability in certain decryption functionality when processing the filePath property. A malicious export can write arbitrary content to any path on the victim's filesystem. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-03T17:45:09.221Z
Reserved: 2026-02-27T00:00:00.000Z
Link: CVE-2026-28373
Updated: 2026-04-03T17:44:17.071Z
Status : Awaiting Analysis
Published: 2026-04-03T17:16:42.140
Modified: 2026-04-07T13:20:55.200
Link: CVE-2026-28373
No data.
OpenCVE Enrichment
Updated: 2026-04-07T07:55:15Z