CVE-2026-5789
Unquoted Search Path in CivetWeb v1.16 Enables Privilege Escalation
Publication date: 2026-04-21
Last updated on: 2026-04-22
Assigner: Spanish National Cybersecurity Institute, S.A. (INCIBE)
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| civetweb_project | civetweb | 1.16 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-428 | The product uses a search path that contains an unquoted element, in which the element contains whitespace or other separators. This can cause the product to access resources in a parent path. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is related to an unquoted search path in CivetWeb version 1.16. Because the service configuration does not include quotes around the executable path, a local attacker can place a malicious executable in a directory that is searched before the legitimate application path. This allows the attacker to execute arbitrary code with elevated privileges.
How can this vulnerability impact me? :
The vulnerability can allow a local attacker to run arbitrary code with elevated privileges on the affected system. This means the attacker could potentially take control of the system, modify or delete data, install malware, or perform other malicious actions with higher access rights than normally permitted.