CVE-2026-28373

Stackfield · Stackfield Desktop App

A path traversal vulnerability in the Stackfield Desktop App's decryption functionality allows malicious exports to write arbitrary content to any path on the victim's filesystem.

Executive summary

The Stackfield Desktop App for macOS and Windows is vulnerable to a critical path traversal flaw that allows attackers to overwrite arbitrary system files via malicious content exports.

Vulnerability

Improper sanitization of the filePath property during the decryption of exported data allows a path traversal attack. This enables a malicious file to escape the intended directory and write data to sensitive locations.

Business impact

An attacker can use this flaw to overwrite critical system files, plant malware, or gain persistence on a user's workstation. The CVSS score of 9.6 highlights the critical risk to endpoint security and the potential for complete workstation compromise.

Remediation

Immediate Action: Force an update of the Stackfield Desktop App to version 1.10.2 or later across all Windows and macOS endpoints.

Proactive Monitoring: Use Endpoint Detection and Response (EDR) tools to monitor for unexpected file-write operations originating from the Stackfield application process.

Compensating Controls: Restrict user permissions to prevent applications from writing to sensitive system directories where possible.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Path traversal leading to arbitrary file writes is a high-impact vulnerability. It is essential to ensure all employees update their desktop clients immediately to version 1.10.2 to protect against potential workstation compromise.