CVE-2026-41530
Description
The automatic folder creation feature of Lhaz and Lhaz+ provided by Chitora soft contains a path traversal vulnerability. When the affected product is configured with the automatic folder creation feature enabled, and a product user tries to extract an archive file which has a crafted file name, then the archived files may be extracted to an unexpected folder.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Lhaz and Lhaz+ versions prior to 2.6.4 and 3.6.4 contain a path traversal vulnerability in path traversal vulnerability in the automatic folder creation feature, allowing extraction to an unexpected folder.
Vulnerability
Overview
Lhaz and Lhaz+ are archive extraction utilities provided by Chitora soft. When the automatic folder creation feature is enabled, the software normally creates a folder named after the archive file and extracts contents into it. However, due to improper handling of crafted archive file names, the folder creation may be bypassed, causing files to be extracted to the parent directory instead of the intended subfolder [1][2]. This is classified as a path traversal vulnerability (CWE-22).
Exploitation
Conditions
Exploitation requires the user to have the automatic folder creation feature enabled and to extract a specially crafted archive file. The attack is local and requires user interaction (e.g., double-clicking the archive). No authentication is needed, but the user must be tricked into extracting a malicious archive. The CVSS v3 base score is 3.3 (Low), reflecting the need for user interaction and the limited scope of impact [2].
Impact
If exploited, an attacker could write files to an unexpected folder, potentially higher-privilege directory (e.g., the user's startup folder or system directories). This could lead to arbitrary code execution with the user's privileges, enabling installation of malware, data modification, or deletion [1][2]. The impact is limited to the user's session and does not directly compromise other users or system-level integrity.
Mitigation
The developer has released patched versions: Lhaz 2.6.4 and Lhaz+ 3.6.4. Users should update to these versions immediately. No workaround is no workaround other workaround is available; disabling the automatic folder creation feature may reduce risk but may not fully prevent exploitation [1][2].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.