Jan 6, 2026·6 min read·5 visits
QNAP's Qfiling application, designed to automate file management, failed to sanitize input paths. This allows unauthenticated remote attackers to traverse the filesystem (via `../`) and read sensitive files like `/etc/shadow`. Patch immediately to version 3.13.1.
A critical unauthenticated path traversal vulnerability in QNAP Qfiling allows remote attackers to read arbitrary system files, turning a handy file-organizing tool into a data exfiltration pipeline.
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U| Product | Affected Versions | Fixed Version |
|---|---|---|
Qfiling QNAP | < 3.13.1 | 3.13.1 |
| Attribute | Detail |
|---|---|
| CWE ID | CWE-22 |
| Attack Vector | Network (CVSS: AV:N) |
| Privileges Required | None (CVSS: PR:N) |
| CVSS v4.0 | 8.1 (High) |
| EPSS Score | 0.18% |
| Impact | High (Confidentiality) |
The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.