CVE-2026-25161

Alist · Alist

Alist, a file list program powered by Gin and Solidjs, contains a high-severity vulnerability that could lead to unauthorized file access or system compromise.

Executive summary

The Alist file list program is affected by a high-severity vulnerability that poses a critical risk to data confidentiality and server security.

Vulnerability

Alist is a versatile file list program supporting multiple storage backends. The vulnerability likely exists in the way the application handles storage requests or authentication, potentially allowing an attacker to bypass security controls and access restricted files or execute unauthorized commands.

Business impact

A successful exploit could result in the exposure of all data stored across the various backends connected to Alist (e.g., cloud storage, local disks). The CVSS score of 8.8 indicates a High severity (bordering on Critical), reflecting the potential for significant data breaches and loss of control over sensitive storage environments.

Remediation

Immediate Action: Update Alist to the latest available version immediately. If a patch is not yet available, consider disabling the service if it is exposed to the public internet.

Proactive Monitoring: Review application logs for unauthorized access attempts or unusual file download activity from unknown IP addresses.

Compensating Controls: Restrict access to the Alist web interface using a VPN or IP allowlisting, and ensure that the underlying storage credentials have the least amount of privilege necessary.

Exploitation status

Public Exploit Available: false

Analyst recommendation

The 8.8 CVSS score makes this the highest-priority vulnerability in this batch. Organizations and individuals using Alist must apply updates immediately and audit their storage permissions to ensure that a compromise of the application does not lead to a total data breach.