CVE-2026-27105
Improper Link Resolution Leading to Arbitrary File Write in Dell Alienware Purchased Apps
Publication date: 2026-04-29
Last updated on: 2026-05-05
Assigner: Dell
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| dell | dell/alienware_purchased_apps | to 1.1.31.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-59 | The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in Dell/Alienware Purchased Apps versions prior to 1.1.31.0. It is an Improper Link Resolution Before File Access vulnerability, also known as a 'Link Following' vulnerability. A low privileged attacker with local access could exploit this issue to perform arbitrary file write operations.
How can this vulnerability impact me? :
Exploitation of this vulnerability could allow an attacker with low privileges and local access to write arbitrary files on the affected system. This could lead to unauthorized modification of files, potentially compromising system integrity and availability.
Can you explain this vulnerability to me?
The vulnerability exists in Dell/Alienware Purchased Apps versions prior to 1.1.31.0 and is an Improper Link Resolution Before File Access, also known as a 'Link Following' vulnerability.
This means that a low privileged attacker with local access could exploit the way the application resolves links before accessing files, potentially allowing them to write arbitrary files on the system.
How can this vulnerability impact me? :
Exploitation of this vulnerability could allow an attacker with low privileges and local access to write arbitrary files on the affected system.
This could lead to unauthorized modification of files, potentially compromising the integrity and availability of the system or applications.