CVE-2026-26228 PUBLISHED

VLC for Android < 3.7.0 Remote Access Path Traversal

Assigner: VulnCheck
Reserved: 11.02.2026 Published: 26.02.2026 Updated: 26.02.2026

VideoLAN VLC for Android prior to version 3.7.0 contains a path traversal vulnerability in the Remote Access Server routing for the authenticated endpoint GET /download. The file query parameter is concatenated into a filesystem path under the configured download directory without canonicalization or directory containment checks, allowing an authenticated attacker with network reachability to the Remote Access Server to request files outside the intended directory. The impact is bounded by the Android application sandbox and storage restrictions, typically limiting exposure to app-internal and app-specific external storage.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
CVSS Score: 2.3

Product Status

Vendor VideoLAN
Product VLC for Android
Versions Default: unaffected
  • affected from 0 to 3.7.0 (excl.)

Credits

  • Stanislav Fort, Aisle Reserach, www.aisle.com finder

References

Problem Types

  • CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE
  • CWE-73 External Control of File Name or Path CWE