Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-m8mh-x359-vm8m | Apktool: Path Traversal to Arbitrary File Write |
Thu, 23 Apr 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apktool
Apktool apktool |
|
| CPEs | cpe:2.3:a:apktool:apktool:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Apktool
Apktool apktool |
Wed, 22 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ibotpeaches
Ibotpeaches apktool |
|
| Vendors & Products |
Ibotpeaches
Ibotpeaches apktool |
Tue, 21 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 21 Apr 2026 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Apktool is a tool for reverse engineering Android APK files. In versions 3.0.0 and 3.0.1, a path traversal vulnerability in `brut/androlib/res/decoder/ResFileDecoder.java` allows a maliciously crafted APK to write arbitrary files to the filesystem during standard decoding (`apktool d`). This is a security regression introduced in commit e10a045 (PR #4041, December 12, 2025), which removed the `BrutIO.sanitizePath()` call that previously prevented path traversal in resource file output paths. An attacker can embed `../` sequences in the `resources.arsc` Type String Pool to escape the output directory and write files to arbitrary locations, including `~/.ssh/config`, `~/.bashrc`, or Windows Startup folders, escalating to RCE. The fix in version 3.0.2 re-introduces `BrutIO.sanitizePath()` in `ResFileDecoder.java` before file write operations. | |
| Title | Apktool: Path Traversal to Arbitrary File Write | |
| Weaknesses | CWE-22 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-23T03:56:04.482Z
Reserved: 2026-04-08T00:01:47.627Z
Link: CVE-2026-39973
Updated: 2026-04-21T13:33:08.739Z
Status : Analyzed
Published: 2026-04-21T02:16:07.903
Modified: 2026-04-23T15:39:26.490
Link: CVE-2026-39973
No data.
OpenCVE Enrichment
Updated: 2026-04-22T11:46:54Z
Github GHSA