CVE-2026-42881 PUBLISHED

STIGQter: Arbitrary File Write leading to Local Code Execution via Export HTML

Assigner: GitHub_M
Reserved: 30.04.2026 Published: 14.05.2026 Updated: 14.05.2026

STIGQter is an open-source reimplementation of DISA's STIG Viewer. From 0.1.2 to before 1.2.7, an attacker can achieve local code execution (LCE) with the privileges of the user running STIGQter. This requires user interaction: the victim must open the malicious .stigqter file and explicitly run the "Export HTML" action. This vulnerability is fixed in 1.2.7.

Metrics

CVSS Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 8.4

Product Status

Vendor squinky86
Product STIGQter
Versions
  • Version >= 0.1.2, < 1.2.7 is affected

References

Problem Types

  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE
  • CWE-73: External Control of File Name or Path CWE