CVE-2026-26959

Source
https://cve.org/CVERecord?id=CVE-2026-26959
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-26959.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-26959
Aliases
  • GHSA-gcgv-2jq7-74rp
Published
2026-02-19T23:16:43.858Z
Modified
2026-03-03T02:56:11.028920Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
ADB Explorer Vulnerable to RCE via Insufficient Input Validation
Details

ADB Explorer is a fluent UI for ADB on Windows. Versions 0.9.26020 and below fail to validate the integrity or authenticity of the ADB binary path specified in the ManualAdbPath setting before executing it, allowing arbitrary code execution with the privileges of the current user. An attacker can exploit this by crafting a malicious App.txt settings file that points ManualAdbPath to an arbitrary executable, then convincing a victim to launch the application with a command-line argument directing it to the malicious configuration directory. This vulnerability could be leveraged through social engineering tactics, such as distributing a shortcut bundled with a crafted settings file in an archive, resulting in RCE upon application startup. Thus issue has been fixed in version 0.9.26021.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/26xxx/CVE-2026-26959.json",
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-829"
    ]
}
References

Affected packages

Git / github.com/alex4ssb/adb-explorer

Affected ranges

Type
GIT
Repo
https://github.com/alex4ssb/adb-explorer
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*
v0.7.0
v0.7.1
v0.7.2
v0.7.3
v0.7.4
v0.7.5
v0.7.6
v0.7.7
v0.7.9
v0.7.9001
v0.8.23030
v0.8.23050
v0.8.23060
v0.8.23090
v0.8.23120
v0.8.24030
v0.8.24060
v0.8.24120
v0.8.24121
v0.9.25020
v0.9.25021
v0.9.25022
v0.9.25050
v0.9.25051
v0.9.25052
v0.9.25060
v0.9.25066
v0.9.25070
v0.9.25080
v0.9.25090
v0.9.25100
v0.9.25101
v0.9.25101r
v0.9.25102
v0.9.25110
v0.9.25111
v0.9.26010
v0.9.26011
v0.9.26020

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-26959.json"